idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
10,422 | php | 16023f3e3b9c06cf677c3c980e8d574e4c162827 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 | None | 1 | PHP_FUNCTION(openssl_random_pseudo_bytes)
{
long buffer_length;
unsigned char *buffer = NULL;
zval *zstrong_result_returned = NULL;
int strong_result = 0;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) {
... | 90,247,547,542,504,240,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-8867 | The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-8867 |
10,425 | php | 97aa752fee61fccdec361279adbfb17a3c60f3f4 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 | None | 1 | mysqlnd_switch_to_ssl_if_needed(
MYSQLND_CONN_DATA * conn,
const MYSQLND_PACKET_GREET * const greet_packet,
const MYSQLND_OPTIONS * const options,
unsigned long mysql_flags
TSRMLS_DC
)
{
enum_func_status ret = FAIL;
const MYSQLND_CHARSET * charset;
MYSQLND_PACKET_AUTH * auth_packet;
DBG_ENTER("mysq... | 296,126,824,449,519,960,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2015-8838 | ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. | https://nvd.nist.gov/vuln/detail/CVE-2015-8838 |
10,428 | qemu | 156a2e4dbffa85997636a7a39ef12da6f1b40254 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=156a2e4dbffa85997636a7a39ef12da6f1b40254 | ehci: make idt processing more robust
Make ehci_process_itd return an error in case we didn't do any actual
iso transfer because we've found no active transaction. That'll avoid
ehci happily run in circles forever if the guest builds a loop out of
idts.
This is CVE-2015-8558.
Cc: qemu-stable@nongnu.org
Reported-by:... | 1 | static int ehci_process_itd(EHCIState *ehci,
EHCIitd *itd,
uint32_t addr)
{
USBDevice *dev;
USBEndpoint *ep;
uint32_t i, len, pid, dir, devaddr, endp;
uint32_t pg, off, ptr1, ptr2, max, mult;
ehci->periodic_sched_active = PERIODIC_ACTIVE... | 186,685,491,160,390,440,000,000,000,000,000,000,000 | hcd-ehci.c | 267,373,257,609,963,030,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-8558 | The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list. | https://nvd.nist.gov/vuln/detail/CVE-2015-8558 |
10,429 | qemu | a890a2f9137ac3cf5b607649e66a6f3a5512d8dc | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc | virtio: validate config_len on load
Malformed input can have config_len in migration stream
exceed the array size allocated on destination, the
result will be heap overflow.
To fix, that config_len matches on both sides.
CVE-2014-0182
Reported-by: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
Signed-off-by: Michae... | 1 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
uint32_t num;
uint32_t features;
uint32_t supported_features;
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f);
if (ret)
return ret;
}
... | 33,588,596,390,600,103,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-0182 | Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2014-0182 |
10,430 | qemu | 8b98a2f07175d46c3f7217639bd5e03f2ec56343 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f | pcnet: fix rx buffer overflow(CVE-2015-7512)
Backends could provide a packet whose length is greater than buffer
size. Check for this and truncate the packet to avoid rx buffer
overflow in this case.
Cc: Prasad J Pandit <pjp@fedoraproject.org>
Cc: qemu-stable@nongnu.org
Reviewed-by: Michael S. Tsirkin <mst@redhat.com... | 1 | ssize_t pcnet_receive(NetClientState *nc, const uint8_t *buf, size_t size_)
{
PCNetState *s = qemu_get_nic_opaque(nc);
int is_padr = 0, is_bcast = 0, is_ladr = 0;
uint8_t buf1[60];
int remaining;
int crc_err = 0;
int size = size_;
if (CSR_DRX(s) || CSR_STOP(s) || CSR_SPND(s) || !size ||
... | 296,112,816,119,408,620,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-7512 | Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-7512 |
10,431 | php | bf58162ddf970f63502837f366930e44d6a992cf | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=bf58162ddf970f63502837f366930e44d6a992cf | None | 1 | PHP_METHOD(Phar, webPhar)
{
zval *mimeoverride = NULL, *rewrite = NULL;
char *alias = NULL, *error, *index_php = NULL, *f404 = NULL, *ru = NULL;
int alias_len = 0, ret, f404_len = 0, free_pathinfo = 0, ru_len = 0;
char *fname, *path_info, *mime_type = NULL, *entry, *pt;
const char *basename;
int fname_len, entry_... | 269,655,417,478,932,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-5589 | The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2015-5589 |
10,440 | php | 0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | None | 1 | ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC)
{
php_stream *tmpstream = NULL;
databuf_t *data = NULL;
char *ptr;
int ch, lastch;
size_t size, rcvd;
size_t lines;
char **ret = NULL;
char **entry;
char *text;
if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) {
php_error_... | 335,438,984,272,943,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-4643 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix ... | https://nvd.nist.gov/vuln/detail/CVE-2015-4643 |
10,441 | php | d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 | None | 1 | PHPAPI char *php_escape_shell_arg(char *str)
{
int x, y = 0, l = strlen(str);
char *cmd;
size_t estimate = (4 * l) + 3;
TSRMLS_FETCH();
cmd = safe_emalloc(4, l, 3); /* worst case */
#ifdef PHP_WIN32
cmd[y++] = '"';
#else
cmd[y++] = '\'';
#endif
for (x = 0; x < l; x++) {
int mb_len = php_mblen(str + x, (l ... | 201,437,012,404,707,300,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2015-4642 | The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function. | https://nvd.nist.gov/vuln/detail/CVE-2015-4642 |
10,459 | qemu | 4b53c2c72cb5541cf394033b528a6fe2a86c0ac1 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1 | virtio: avoid buffer overrun on incoming migration
CVE-2013-6399
vdev->queue_sel is read from the wire, and later used in the
emulation code as an index into vdev->vq[]. If the value of
vdev->queue_sel exceeds the length of vdev->vq[], currently
allocated to be VIRTIO_PCI_QUEUE_MAX elements, subsequent PIO
operations... | 1 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
uint32_t num;
uint32_t features;
uint32_t supported_features;
BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f... | 324,234,853,826,218,240,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-6399 | Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-6399 |
10,460 | pixman | 857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | None | 1 | create_bits (pixman_format_code_t format,
int width,
int height,
int * rowstride_bytes,
pixman_bool_t clear)
{
int stride;
size_t buf_size;
int bpp;
/* what follows is a long-winded way, avoiding any possibility of inte... | 338,189,852,796,356,470,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-9766 | Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values. | https://nvd.nist.gov/vuln/detail/CVE-2014-9766 |
10,461 | qemu | 3c99afc779c2c78718a565ad8c5e98de7c2c7484 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3c99afc779c2c78718a565ad8c5e98de7c2c7484 | vmxnet3: validate interrupt indices read on migration
CVE-2013-4544
Signed-off-by: Dmitry Fleytman <dmitry@daynix.com>
Reported-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 1396604722-11902-4-git-send-e... | 1 | static int vmxnet3_post_load(void *opaque, int version_id)
{
VMXNET3State *s = opaque;
PCIDevice *d = PCI_DEVICE(s);
vmxnet_tx_pkt_init(&s->tx_pkt, s->max_tx_frags, s->peer_has_vhdr);
vmxnet_rx_pkt_init(&s->rx_pkt, s->peer_has_vhdr);
if (s->msix_used) {
if (!vmxnet3_use_msix_vectors(s, VM... | 41,449,705,420,556,697,000,000,000,000,000,000,000 | vmxnet3.c | 158,084,607,350,311,640,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4544 | hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2013-4544 |
10,462 | qemu | d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62 | vmstate: fix buffer overflow in target-arm/machine.c
CVE-2013-4531
cpreg_vmstate_indexes is a VARRAY_INT32. A negative value for
cpreg_vmstate_array_len will cause a buffer overflow.
VMSTATE_INT32_LE was supposed to protect against this
but doesn't because it doesn't validate that input is
non-negative.
Fix this ma... | 1 | static int get_int32_le(QEMUFile *f, void *pv, size_t size)
{
int32_t loaded;
int32_t loaded;
qemu_get_sbe32s(f, &loaded);
if (loaded <= *cur) {
*cur = loaded;
return 0;
}
}
| 134,727,717,376,042,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4531 | Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4531 |
10,463 | exempi | 886cd1d2314755adb1f4cdb99c16ff00830f0331 | https://cgit.freedesktop.org/exempi/commit/?id=aabedb5e749dd59112a3fe1e8e08f2d934f56666 | https://cgit.freedesktop.org/exempi/commit/?id=886cd1d2314755adb1f4cdb99c16ff00830f0331 | None | 1 | bool TradQT_Manager::ParseCachedBoxes ( const MOOV_Manager & moovMgr )
{
MOOV_Manager::BoxInfo udtaInfo;
MOOV_Manager::BoxRef udtaRef = moovMgr.GetBox ( "moov/udta", &udtaInfo );
if ( udtaRef == 0 ) return false;
for ( XMP_Uns32 i = 0; i < udtaInfo.childCount; ++i ) {
MOOV_Manager::BoxInfo currInfo;
MOOV_Man... | 23,259,527,281,897,320,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-18238 | An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18238 |
10,468 | exempi | 65a8492832b7335ffabd01f5f64d89dec757c260 | https://cgit.freedesktop.org/exempi/commit/?id=aabedb5e749dd59112a3fe1e8e08f2d934f56666 | https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260 | None | 1 | Chunk::Chunk( ContainerChunk* parent, RIFF_MetaHandler* handler, bool skip, ChunkType c )
{
chunkType = c; // base class assumption
this->parent = parent;
this->oldSize = 0;
this->hasChange = false; // [2414649] valid assumption at creation time
XMP_IO* file = handler->parent->ioRef;
this->oldPos = file->Offs... | 327,787,765,077,432,330,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-18233 | An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18233 |
10,469 | qemu | f153b563f8cf121aebf5a2fff5f0110faf58ccb3 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=f153b563f8cf121aebf5a2fff5f0110faf58ccb3 | cirrus: handle negative pitch in cirrus_invalidate_region()
cirrus_invalidate_region() calls memory_region_set_dirty()
on a per-line basis, always ranging from off_begin to
off_begin+bytesperline. With a negative pitch off_begin
marks the top most used address and thus we need to do an
initial shift backwards by a lin... | 1 | static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin,
int off_pitch, int bytesperline,
int lines)
{
int y;
int off_cur;
int off_cur_end;
for (y = 0; y < lines; y++) {
off_cur = off_begin;
off_cur_end = (off_cur + bytesperline) & s->cirrus_addr_mas... | 18,925,896,616,992,010,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-18030 | The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. | https://nvd.nist.gov/vuln/detail/CVE-2017-18030 |
10,470 | qemu | c05e4667be91b46ab42b5a11babf8e84d476cc6b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c05e4667be91b46ab42b5a11babf8e84d476cc6b | qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)
For the L1 table to loaded for an internal snapshot, the code allocated
only enough memory to hold the currently active L1 table. If the
snapshot's L1 table is actually larger than the current one, this leads
to a buffer overflow.
Signed-off-b... | 1 | int qcow2_snapshot_load_tmp(BlockDriverState *bs,
const char *snapshot_id,
const char *name,
Error **errp)
{
int i, snapshot_index;
BDRVQcowState *s = bs->opaque;
QCowSnapshot *sn;
uint64_t *new_l1_table;
int new_l1_... | 144,482,353,548,212,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-0145 | Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n... | https://nvd.nist.gov/vuln/detail/CVE-2014-0145 |
10,471 | qemu | 509a41bab5306181044b5fff02eadf96d9c8676a | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=509a41bab5306181044b5fff02eadf96d9c8676a | block/cloop: prevent offsets_size integer overflow (CVE-2014-0143)
The following integer overflow in offsets_size can lead to out-of-bounds
memory stores when n_blocks has a huge value:
uint32_t n_blocks, offsets_size;
[...]
ret = bdrv_pread(bs->file, 128 + 4, &s->n_blocks, 4);
[...]
s->n_blocks =... | 1 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 202,962,117,817,616,150,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,472 | qemu | e3737b820b45e54b059656dc3f914f895ac7a88b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=e3737b820b45e54b059656dc3f914f895ac7a88b | bochs: Check catalog_size header field (CVE-2014-0143)
It should neither become negative nor allow unbounded memory
allocations. This fixes aborts in g_malloc() and an s->catalog_bitmap
buffer overflow on big endian hosts.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>... | 1 | static int bochs_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVBochsState *s = bs->opaque;
uint32_t i;
struct bochs_header bochs;
int ret;
bs->read_only = 1; // no write support yet
ret = bdrv_pread(bs->file, 0, &bochs, sizeof(bochs));
if (... | 228,447,863,724,695,350,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,473 | qemu | db8a31d11d6a60f48d6817530640d75aa72a9a2f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=db8a31d11d6a60f48d6817530640d75aa72a9a2f | qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)
This ensures that the checks catch all invalid cluster indexes
instead of returning the refcount of a wrong cluster.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com... | 1 | static int get_refcount(BlockDriverState *bs, int64_t cluster_index)
{
BDRVQcowState *s = bs->opaque;
int refcount_table_index, block_index;
int64_t refcount_block_offset;
int ret;
uint16_t *refcount_block;
uint16_t refcount;
refcount_table_index = cluster_index >> (s->cluster_bits - ... | 40,167,723,741,227,405,000,000,000,000,000,000,000 | qcow2-refcount.c | 238,076,570,902,205,180,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,474 | qemu | 6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)
This avoids an unbounded allocation.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 1 | int qcow2_snapshot_load_tmp(BlockDriverState *bs,
const char *snapshot_id,
const char *name,
Error **errp)
{
int i, snapshot_index;
BDRVQcowState *s = bs->opaque;
QCowSnapshot *sn;
uint64_t *new_l1_table;
int new_l1_... | 73,607,432,206,298,630,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,476 | qemu | 8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | block: Limit request size (CVE-2014-0143)
Limiting the size of a single request to INT_MAX not only fixes a
direct integer overflow in bdrv_check_request() (which would only
trigger bad behaviour with ridiculously huge images, as in close to
2^64 bytes), but can also prevent overflows in all block drivers.
Signed-off... | 1 | static int bdrv_check_request(BlockDriverState *bs, int64_t sector_num,
int nb_sectors)
{
return bdrv_check_byte_request(bs, sector_num * BDRV_SECTOR_SIZE,
nb_sectors * BDRV_SECTOR_SIZE);
}
| 334,793,103,852,536,480,000,000,000,000,000,000,000 | block.c | 262,553,636,226,404,800,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,477 | qemu | cab60de930684c33f67d4e32c7509b567f8c445b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=cab60de930684c33f67d4e32c7509b567f8c445b | qcow2: Fix new L1 table size check (CVE-2014-0143)
The size in bytes is assigned to an int later, so check that instead of
the number of entries.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 1 | int qcow2_grow_l1_table(BlockDriverState *bs, uint64_t min_size,
bool exact_size)
{
BDRVQcowState *s = bs->opaque;
int new_l1_size2, ret, i;
uint64_t *new_l1_table;
int64_t old_l1_table_offset, old_l1_size;
int64_t new_l1_table_offset, new_l1_size;
uint8_t data[12];
... | 250,508,172,956,291,080,000,000,000,000,000,000,000 | qcow2-cluster.c | 187,376,374,035,438,880,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,485 | qemu | 9c6b899f7a46893ab3b671e341a2234e9c0c060e | https://github.com/bonzini/qemu | http://git.qemu-project.org/?p=qemu.git;a=commitdiff;h=9c6b899f7a46893ab3b671e341a2234e9c0c060e | 9pfs: local: set the path of the export root to "."
The local backend was recently converted to using "at*()" syscalls in order
to ensure all accesses happen below the shared directory. This requires that
we only pass relative paths, otherwise the dirfd argument to the "at*()"
syscalls is ignored and the path is treat... | 1 | static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path,
const char *name, V9fsPath *target)
{
if (dir_path) {
v9fs_path_sprintf(target, "%s/%s", dir_path->data, name);
} else {
v9fs_path_sprintf(target, "%s", name);
}
return 0;
}
| 131,046,614,036,663,150,000,000,000,000,000,000,000 | 9p-local.c | 223,156,347,871,135,400,000,000,000,000,000,000,000 | [
"CWE-732"
] | CVE-2017-7471 | Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared f... | https://nvd.nist.gov/vuln/detail/CVE-2017-7471 |
10,486 | qemu | bea60dd7679364493a0d7f5b54316c767cf894ef | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=bea60dd7679364493a0d7f5b54316c767cf894ef | ui/vnc: fix potential memory corruption issues
this patch makes the VNC server work correctly if the
server surface and the guest surface have different sizes.
Basically the server surface is adjusted to not exceed VNC_MAX_WIDTH
x VNC_MAX_HEIGHT and additionally the width is rounded up to multiple of
VNC_DIRTY_PIXELS... | 1 | static void check_pointer_type_change(Notifier *notifier, void *data)
{
VncState *vs = container_of(notifier, VncState, mouse_mode_notifier);
int absolute = qemu_input_is_absolute();
if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE) && vs->absolute != absolute) {
vnc_write_u8(vs, 0);
... | 294,365,666,750,487,830,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-2633 | An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2017-2633 |
10,508 | xcursor | 897213f36baf6926daf6d192c709cf627aa5fd05 | https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 | https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05 | None | 1 | _XcursorThemeInherits (const char *full)
{
char line[8192];
char *result = NULL;
FILE *f;
if (!full)
return NULL;
f = fopen (full, "r");
if (f)
{
while (fgets (line, sizeof (line), f))
{
if (!strncmp (line, "Inherits", 8))
{
char *l = line + 8;
char *... | 11,633,313,935,301,854,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-9262 | _XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow. | https://nvd.nist.gov/vuln/detail/CVE-2015-9262 |
10,516 | bdwgc | e10c1eb9908c2774c16b3148b30d2f3823d66a9a | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/e10c1eb9908c2774c16b3148b30d2f3823d66a9a | Fix calloc() overflow
* malloc.c (calloc): Check multiplication overflow in calloc(),
assuming REDIRECT_MALLOC. | 1 | void * calloc(size_t n, size_t lb)
{
# if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */
/* libpthread allocated some memory that is only pointed to by */
/* mmapped thread stacks. Make sure it's not collectable. */
{
static GC_bool lib_bounds_set = F... | 336,851,372,175,251,460,000,000,000,000,000,000,000 | malloc.c | 138,595,466,117,934,970,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,519 | webserver | fbda667221c51f0aa476a02366e0cf66cb012f88 | https://github.com/cherokee/webserver | https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88 | Prevent the LDAP validator from accepting an empty password. | 1 | cherokee_validator_ldap_check (cherokee_validator_ldap_t *ldap,
cherokee_connection_t *conn)
{
int re;
ret_t ret;
size_t size;
char *dn;
LDAPMessage *m... | 314,951,664,888,072,700,000,000,000,000,000,000,000 | validator_ldap.c | 54,143,953,091,956,420,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2014-4668 | The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password. | https://nvd.nist.gov/vuln/detail/CVE-2014-4668 |
10,520 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstore_from_array(PG_FUNCTION_ARGS)
{
ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0);
int ndims = ARR_NDIM(in_array);
int count;
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *in_datums;
bool *in_nulls;
int in_count;
int i;
Assert(ARR_ELEMTYPE(in_array) == TEXTOID);
switch (ndims)
... | 35,573,989,238,073,480,000,000,000,000,000,000,000 | hstore_io.c | 316,768,376,712,621,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,521 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstore_from_arrays(PG_FUNCTION_ARGS)
{
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *key_datums;
bool *key_nulls;
int key_count;
Datum *value_datums;
bool *value_nulls;
int value_count;
ArrayType *key_array;
ArrayType *value_array;
int i;
if (PG_ARGISNULL(0))
PG_RETURN_NULL(... | 39,825,315,315,274,815,000,000,000,000,000,000,000 | hstore_io.c | 316,768,376,712,621,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,523 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstore_recv(PG_FUNCTION_ARGS)
{
int32 buflen;
HStore *out;
Pairs *pairs;
int32 i;
int32 pcount;
StringInfo buf = (StringInfo) PG_GETARG_POINTER(0);
pcount = pq_getmsgint(buf, 4);
if (pcount == 0)
{
out = hstorePairs(NULL, 0, 0);
PG_RETURN_POINTER(out);
}
pairs = palloc(pcount * sizeof(Pai... | 173,364,060,110,722,760,000,000,000,000,000,000,000 | hstore_io.c | 316,768,376,712,621,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,524 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstoreArrayToPairs(ArrayType *a, int *npairs)
{
Datum *key_datums;
bool *key_nulls;
int key_count;
Pairs *key_pairs;
int bufsiz;
int i,
j;
deconstruct_array(a,
TEXTOID, -1, false, 'i',
&key_datums, &key_nulls, &key_count);
if (key_count == 0)
{
*npairs = 0;
return NULL;
... | 9,891,750,996,379,655,000,000,000,000,000,000,000 | hstore_op.c | 36,855,987,079,836,915,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,533 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | path_in(PG_FUNCTION_ARGS)
{
char *str = PG_GETARG_CSTRING(0);
PATH *path;
int isopen;
char *s;
int npts;
int size;
int depth = 0;
if ((npts = pair_count(str, ',')) <= 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_TEXT_REPRESENTATION),
errmsg("invalid input syntax for type path: \... | 185,822,385,736,836,400,000,000,000,000,000,000,000 | geo_ops.c | 8,157,459,893,315,236,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,551 | libreswan | 2899351224fe2940aec37d7656e1e392c0fe07f0 | https://github.com/libreswan/libreswan | https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e392c0fe07f0 | SECURITY: Properly handle IKEv2 I1 notification packet without KE payload | 1 | stf_status ikev2parent_inI1outR1(struct msg_digest *md)
{
struct state *st = md->st;
lset_t policy = POLICY_IKEV2_ALLOW;
struct connection *c = find_host_connection(&md->iface->ip_addr,
md->iface->port,
&md->sender,
md->sender_port,
POLICY_IKEV2_ALLOW);
/* retrieve st->st_gi... | 38,971,431,341,179,710,000,000,000,000,000,000,000 | ikev2_parent.c | 85,811,802,628,764,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-7294 | The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload. | https://nvd.nist.gov/vuln/detail/CVE-2013-7294 |
10,559 | redis | fdf9d455098f54f7666c702ae464e6ea21e25411 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 | disable loading lua bytecode | 1 | static void f_parser (lua_State *L, void *ud) {
int i;
Proto *tf;
Closure *cl;
struct SParser *p = cast(struct SParser *, ud);
int c = luaZ_lookahead(p->z);
luaC_checkGC(L);
tf = ((c == LUA_SIGNATURE[0]) ? luaU_undump : luaY_parser)(L, p->z,
... | 299,852,641,650,757,280,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-4335 | Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command. | https://nvd.nist.gov/vuln/detail/CVE-2015-4335 |
10,560 | httpd | cd2b7a26c776b0754fb98426a67804fd48118708 | https://github.com/apache/httpd | https://github.com/apache/httpd/commit/cd2b7a26c776b0754fb98426a67804fd48118708 | None | 1 | AP_DECLARE(int) ap_process_request_internal(request_rec *r)
{
int file_req = (r->main && r->filename);
int access_status;
core_dir_config *d;
/* Ignore embedded %2F's in path for proxy requests */
if (!r->proxyreq && r->parsed_uri.path) {
d = ap_get_core_module_config(r->per_dir_config);
... | 39,276,683,520,320,650,000,000,000,000,000,000,000 | request.c | 51,187,103,204,958,810,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-3185 | The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic cir... | https://nvd.nist.gov/vuln/detail/CVE-2015-3185 |
10,564 | httpd | 643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef | https://github.com/apache/httpd | https://github.com/apache/httpd/commit/643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef | None | 1 | static int lua_websocket_read(lua_State *L)
{
apr_socket_t *sock;
apr_status_t rv;
int n = 0;
apr_size_t len = 1;
apr_size_t plen = 0;
unsigned short payload_short = 0;
apr_uint64_t payload_long = 0;
unsigned char *mask_bytes;
char byte;
int plaintext;
reques... | 94,610,840,135,161,180,000,000,000,000,000,000,000 | lua_request.c | 309,024,862,298,295,530,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-0228 | The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function. | https://nvd.nist.gov/vuln/detail/CVE-2015-0228 |
10,569 | libzip | 9b46957ec98d85a572e9ef98301247f39338a3b5 | https://github.com/nih-at/libzip | https://github.com/nih-at/libzip/commit/9b46957ec98d85a572e9ef98301247f39338a3b5 | Make eocd checks more consistent between zip and zip64 cases. | 1 | _zip_read_eocd64(zip_source_t *src, zip_buffer_t *buffer, zip_uint64_t buf_offset, unsigned int flags, zip_error_t *error)
{
zip_cdir_t *cd;
zip_uint64_t offset;
zip_uint8_t eocd[EOCD64LEN];
zip_uint64_t eocd_offset;
zip_uint64_t size, nentry, i, eocdloc_offset;
bool free_buffer;
zip_uint32_... | 57,474,523,618,150,935,000,000,000,000,000,000,000 | zip_open.c | 296,826,865,575,292,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-14107 | The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2017-14107 |
10,573 | libzip | 2217022b7d1142738656d891e00b3d2d9179b796 | https://github.com/nih-at/libzip | https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796 | Fix double free().
Found by Brian 'geeknik' Carpenter using AFL. | 1 | _zip_dirent_read(zip_dirent_t *zde, zip_source_t *src, zip_buffer_t *buffer, bool local, zip_error_t *error)
{
zip_uint8_t buf[CDENTRYSIZE];
zip_uint16_t dostime, dosdate;
zip_uint32_t size, variable_size;
zip_uint16_t filename_len, comment_len, ef_len;
bool from_buffer = (buffer != NULL);
siz... | 126,446,829,664,279,170,000,000,000,000,000,000,000 | zip_dirent.c | 7,431,470,097,304,342,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-12858 | Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-12858 |
10,574 | nagioscore | 1b197346d490df2e2d3b1dcce5ac6134ad0c8752 | https://github.com/NagiosEnterprises/nagioscore | https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752 | halfway revert hack/configure changes - switch order of daemon_init/drop_privileges | 1 | int main(int argc, char **argv) {
int result;
int error = FALSE;
int display_license = FALSE;
int display_help = FALSE;
int c = 0;
struct tm *tm, tm_s;
time_t now;
char datestring[256];
nagios_macros *mac;
const char *worker_socket = NULL;
int i;
#ifdef HAVE_SIGACTION
struct sigaction sig_action;
#endif
#i... | 182,984,082,189,353,020,000,000,000,000,000,000,000 | nagios.c | 106,459,785,303,224,300,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2017-12847 | Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command. | https://nvd.nist.gov/vuln/detail/CVE-2017-12847 |
10,577 | httpd | 29afdd2550b3d30a8defece2b95ae81edcf66ac9 | https://github.com/apache/httpd | https://github.com/apache/httpd/commit/29afdd2550b3d30a8defece2b95ae81edcf66ac9 | None | 1 | AP_CORE_DECLARE_NONSTD(const char *) ap_limit_section(cmd_parms *cmd,
void *dummy,
const char *arg)
{
const char *endp = ap_strrchr_c(arg, '>');
const char *limited_methods;
void *tog = cmd->cmd->cmd_... | 137,119,598,395,414,450,000,000,000,000,000,000,000 | core.c | 319,003,475,762,410,800,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9798 | Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9798 |
10,578 | qemu | 30663fd26c0307e414622c7a8607fbc04f92ec14 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/30663fd26c0307e414622c7a8607fbc04f92ec14 | tcg/i386: Check the size of instruction being translated
This fixes the bug: 'user-to-root privesc inside VM via bad translation
caching' reported by Jann Horn here:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1122
Reviewed-by: Richard Henderson <rth@twiddle.net>
CC: Peter Maydell <peter.maydell@linaro.... | 1 | static target_ulong disas_insn(CPUX86State *env, DisasContext *s,
target_ulong pc_start)
{
int b, prefixes;
int shift;
TCGMemOp ot, aflag, dflag;
int modrm, reg, rm, mod, op, opreg, val;
target_ulong next_eip, tval;
int rex_w, rex_r;
s->pc_start = s->pc = pc_s... | 221,784,271,832,947,280,000,000,000,000,000,000,000 | translate.c | 237,269,157,204,909,700,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2017-8284 | The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: th... | https://nvd.nist.gov/vuln/detail/CVE-2017-8284 |
10,586 | redis | 874804da0c014a7d704b3d285aa500098a931f50 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50 | Security: Cross Protocol Scripting protection.
This is an attempt at mitigating problems due to cross protocol
scripting, an attack targeting services using line oriented protocols
like Redis that can accept HTTP requests as valid protocol, by
discarding the invalid parts and accepting the payloads sent, for
example, ... | 1 | void processInputBuffer(client *c) {
server.current_client = c;
/* Keep processing while there is something in the input buffer */
while(sdslen(c->querybuf)) {
/* Return if clients are paused. */
if (!(c->flags & CLIENT_SLAVE) && clientsArePaused()) break;
/* Immediately abort if th... | 23,874,964,081,148,540,000,000,000,000,000,000,000 | networking.c | 48,401,747,573,780,290,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2016-10517 | networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port). | https://nvd.nist.gov/vuln/detail/CVE-2016-10517 |
10,589 | quagga | cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 | https://github.com/Quagga/quagga | https://github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 | zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245)
The IPv6 RA code also receives ICMPv6 RS and RA messages.
Unfortunately, by bad coding practice, the buffer size specified on
receiving such messages mixed up 2 constants that in fact have
different values.
The code itself has:
#define RTADV_MSG_SIZE 4096
... | 1 | rtadv_read (struct thread *thread)
{
int sock;
int len;
u_char buf[RTADV_MSG_SIZE];
struct sockaddr_in6 from;
ifindex_t ifindex = 0;
int hoplimit = -1;
struct zebra_vrf *zvrf = THREAD_ARG (thread);
sock = THREAD_FD (thread);
zvrf->rtadv.ra_read = NULL;
/* Register myself. */
rtadv_event (zvrf,... | 147,071,443,723,396,080,000,000,000,000,000,000,000 | rtadv.c | 30,739,729,205,235,150,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1245 | It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent. | https://nvd.nist.gov/vuln/detail/CVE-2016-1245 |
10,592 | ntp | 553f2fa65865c31c5e3c48812cfd46176cffdd27 | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27 | [Bug 1593] ntpd abort in free() with logconfig syntax error. | 1 | yyparse (void *YYPARSE_PARAM)
#else
int
yyparse (YYPARSE_PARAM)
void *YYPARSE_PARAM;
#endif
#else /* ! YYPARSE_PARAM */
#if (defined __STDC__ || defined __C99__FUNC__ \
|| defined __cplusplus || defined _MSC_VER)
int
yyparse (void)
#else
int
yyparse ()
#endif
#endif
{
int yystate;
/* Number of token... | 257,701,482,880,795,130,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-5194 | The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands. | https://nvd.nist.gov/vuln/detail/CVE-2015-5194 |
10,593 | libinfinity | c97f870f5ae13112988d9f8ad464b4f679903706 | https://github.com/gobby/libinfinity | https://github.com/gobby/libinfinity/commit/c97f870f5ae13112988d9f8ad464b4f679903706 | Fix expired certificate validation (gobby #61) | 1 | inf_gtk_certificate_manager_certificate_func(InfXmppConnection* connection,
gnutls_session_t session,
InfCertificateChain* chain,
gpointer user_data)
{
InfGtkCertificateManager* manag... | 235,055,126,631,798,940,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2015-3886 | libinfinity before 0.6.6-1 does not validate expired SSL certificates, which allows remote attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-3886 |
10,594 | aircrack-ng | 88702a3ce4c28a973bf69023cd0312f412f6193e | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e | OSdep: Fixed segmentation fault that happens with a malicious server sending a negative length (Closes #16 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2419 28c6078b-6c39-48e3-add9-af49d547ecab | 1 | int net_get(int s, void *arg, int *len)
{
struct net_hdr nh;
int plen;
if (net_read_exact(s, &nh, sizeof(nh)) == -1)
{
return -1;
}
plen = ntohl(nh.nh_len);
if (!(plen <= *len))
printf("PLEN %d type %d len %d\n",
plen, nh.nh_type, *len);
assert(plen <= *len); /* XXX */
*len = plen;... | 279,652,316,899,343,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
10,595 | aircrack-ng | da087238963c1239fdabd47dc1b65279605aca70 | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70 | Buddy-ng: Fixed segmentation fault (Closes #15 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2418 28c6078b-6c39-48e3-add9-af49d547ecab | 1 | int handle(int s, unsigned char* data, int len, struct sockaddr_in *s_in)
{
char buf[2048];
unsigned short *cmd = (unsigned short *)buf;
int plen;
struct in_addr *addr = &s_in->sin_addr;
unsigned short *pid = (unsigned short*) data;
/* inet check */
if (len == S_HELLO_LEN && memcmp(data, "sorbo", 5) == 0) {
u... | 25,249,288,086,872,368,000,000,000,000,000,000,000 | buddy-ng.c | 301,965,276,755,639,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
10,596 | liblouis | 5e4089659bb49b3095fa541fa6387b4c40d7396e | https://github.com/liblouis/liblouis | https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e | Fix a buffer overflow
Fixes #635
Thanks to HongxuChen for reporting it | 1 | matchCurrentInput(
const InString *input, int pos, const widechar *passInstructions, int passIC) {
int k;
int kk = pos;
for (k = passIC + 2; k < passIC + 2 + passInstructions[passIC + 1]; k++)
if (input->chars[kk] == ENDSEGMENT || passInstructions[k] != input->chars[kk++])
return 0;
return 1;
}
| 186,673,007,973,266,360,000,000,000,000,000,000,000 | lou_translateString.c | 70,752,525,751,776,170,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-17294 | The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries. | https://nvd.nist.gov/vuln/detail/CVE-2018-17294 |
10,597 | gimp | c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | https://github.com/GNOME/gimp | https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | Issue #1689: create unique temporary file with g_file_open_tmp().
Not sure this is really solving the issue reported, which is that
`g_get_tmp_dir()` uses environment variables (yet as g_file_open_tmp()
uses g_get_tmp_dir()…). But at least g_file_open_tmp() should create
unique temporary files, which prevents overridi... | 1 | gimp_write_and_read_file (Gimp *gimp,
gboolean with_unusual_stuff,
gboolean compat_paths,
gboolean use_gimp_2_8_features)
{
GimpImage *image;
GimpImage *loaded_image;
GimpPlugInProcedure *proc;
gchar ... | 123,602,888,792,994,790,000,000,000,000,000,000,000 | test-xcf.c | 105,916,755,942,525,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12713 | GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be priva... | https://nvd.nist.gov/vuln/detail/CVE-2018-12713 |
10,598 | redis | c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | Abort in XGROUP if the key is not a stream | 1 | void xgroupCommand(client *c) {
const char *help[] = {
"CREATE <key> <groupname> <id or $> -- Create a new consumer group.",
"SETID <key> <groupname> <id or $> -- Set the current group ID.",
"DELGROUP <key> <groupname> -- Remove the specified group.",
"DELCONSUMER <key> <groupname> <consu... | 81,308,784,981,755,860,000,000,000,000,000,000,000 | t_stream.c | 78,741,619,913,869,620,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-12453 | Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream. | https://nvd.nist.gov/vuln/detail/CVE-2018-12453 |
10,599 | redis | 9fdcc15962f9ff4baebe6fdd947816f43f730d50 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50 | Security: fix redis-cli buffer overflow.
Thanks to Fakhri Zulkifli for reporting it.
The fix switched to dynamic allocation, copying the final prompt in the
static buffer only at the end. | 1 | static void cliRefreshPrompt(void) {
int len;
if (config.eval_ldb) return;
if (config.hostsocket != NULL)
len = snprintf(config.prompt,sizeof(config.prompt),"redis %s",
config.hostsocket);
else
len = anetFormatAddr(config.prompt, sizeof(config.prompt),
... | 178,423,737,865,105,360,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-12326 | Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument fro... | https://nvd.nist.gov/vuln/detail/CVE-2018-12326 |
10,600 | PDFGen | ee58aff6918b8bbc3be29b9e3089485ea46ff956 | https://github.com/AndreRenaud/PDFGen | https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956 | jpeg: Fix another possible buffer overrun
Found via the clang libfuzzer | 1 | static int jpeg_size(unsigned char* data, unsigned int data_size,
int *width, int *height)
{
int i = 0;
if (i + 3 < data_size && data[i] == 0xFF && data[i+1] == 0xD8 &&
data[i+2] == 0xFF && data[i+3] == 0xE0) {
i += 4;
if(i + 6 < data_size &&
data... | 283,638,409,723,498,760,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11363 | jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read. | https://nvd.nist.gov/vuln/detail/CVE-2018-11363 |
10,601 | redis | e89086e09a38cc6713bcd4b9c29abf92cf393936 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 | Security: fix Lua struct package offset handling.
After the first fix to the struct package I found another similar
problem, which is fixed by this patch. It could be reproduced easily by
running the following script:
return struct.unpack('f', "xxxxxxxxxxxxx",-3)
The above will access bytes before the 'data' poi... | 1 | static int b_unpack (lua_State *L) {
Header h;
const char *fmt = luaL_checkstring(L, 1);
size_t ld;
const char *data = luaL_checklstring(L, 2, &ld);
size_t pos = luaL_optinteger(L, 3, 1) - 1;
int n = 0; /* number of results */
defaultoptions(&h);
while (*fmt) {
int opt = *fmt++;
size_t ... | 173,966,888,912,004,300,000,000,000,000,000,000,000 | lua_struct.c | 181,615,881,789,836,040,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-11219 | An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking. | https://nvd.nist.gov/vuln/detail/CVE-2018-11219 |
10,607 | openmpt | 492022c7297ede682161d9c0ec2de15526424e76 | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76 | None | 1 | std::vector<GetLengthType> CSoundFile::GetLength(enmGetLengthResetMode adjustMode, GetLengthTarget target)
{
std::vector<GetLengthType> results;
GetLengthType retval;
retval.startOrder = target.startOrder;
retval.startRow = target.startRow;
const bool hasSearchTarget = target.mode != GetLengthTarget::NoTarget;
c... | 139,424,168,971,208,380,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10017 | soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before 0.3.8 allows remote attackers to cause a denial of service (out-of-bounds read) via an IT or MO3 file with many nested pattern loops. | https://nvd.nist.gov/vuln/detail/CVE-2018-10017 |
10,608 | libevt | 444ca3ce7853538c577e0ec3f6146d2d65780734 | https://github.com/libyal/libevt | https://github.com/libyal/libevt/commit/444ca3ce7853538c577e0ec3f6146d2d65780734 | None | 1 | int libevt_record_values_read_event(
libevt_record_values_t *record_values,
uint8_t *record_data,
size_t record_data_size,
uint8_t strict_mode,
libcerror_error_t **error )
{
static char *function = "libevt_record_values_read_event";
size_t record_data_offset = 0;
size_t strings_data_of... | 288,479,666,967,874,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-8754 | The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub | https://nvd.nist.gov/vuln/detail/CVE-2018-8754 |
10,616 | gifsicle | 118a46090c50829dc543179019e6140e1235f909 | https://github.com/kohler/gifsicle | https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909 | gif_read: Set last_name = NULL unconditionally.
With a non-malicious GIF, last_name is set to NULL when a name
extension is followed by an image. Reported in #117, via
Debian, via a KAIST fuzzing program. | 1 | read_gif(Gif_Reader *grr, int read_flags,
const char* landmark, Gif_ReadErrorHandler handler)
{
Gif_Stream *gfs;
Gif_Image *gfi;
Gif_Context gfc;
int unknown_block_type = 0;
if (gifgetc(grr) != 'G' ||
gifgetc(grr) != 'I' ||
gifgetc(grr) != 'F')
return 0;
(void)gifgetc(grr);
(void)gifget... | 145,328,850,450,328,550,000,000,000,000,000,000,000 | gifread.c | 329,987,187,594,896,880,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18120 | A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421. | https://nvd.nist.gov/vuln/detail/CVE-2017-18120 |
10,617 | rpm | c815822c8bdb138066ff58c624ae83e3a12ebfa9 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 | Make verification match the new restricted directory symlink behavior
Only follow directory symlinks owned by target directory owner or root
during verification to match the behavior of fsmVerify() in the new
CVE-2017-7500 world order.
The code is klunkier than it should and the logic should use common code
with fsmV... | 1 | rpmVerifyAttrs rpmfilesVerify(rpmfiles fi, int ix, rpmVerifyAttrs omitMask)
{
rpm_mode_t fmode = rpmfilesFMode(fi, ix);
rpmfileAttrs fileAttrs = rpmfilesFFlags(fi, ix);
rpmVerifyAttrs flags = rpmfilesVFlags(fi, ix);
const char * fn = rpmfilesFN(fi, ix);
struct stat sb;
rpmVerifyAttrs vfy = RPMVE... | 253,992,275,898,542,300,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2017-7500 | It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory... | https://nvd.nist.gov/vuln/detail/CVE-2017-7500 |
10,622 | optee_os | b60e1cee406a1ff521145ab9534370dfb85dd592 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/b60e1cee406a1ff521145ab9534370dfb85dd592 | svc: check for allocation overflow in syscall_cryp_obj_populate
Without checking for overflow there is a risk of allocating a buffer
with size smaller than anticipated and as a consequence of that it might
lead to a heap based overflow with attacker controlled data written
outside the boundaries of the buffer.
Fixes:... | 1 | TEE_Result syscall_cryp_obj_populate(unsigned long obj,
struct utee_attribute *usr_attrs,
unsigned long attr_count)
{
TEE_Result res;
struct tee_ta_session *sess;
struct tee_obj *o;
const struct tee_cryp_obj_type_props *type_props;
TEE_Attribute *attrs = NULL;
res = tee_ta_get_current_session(&sess);
if (... | 230,472,388,512,462,140,000,000,000,000,000,000,000 | tee_svc_cryp.c | 183,791,838,370,556,260,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-1010296 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Buffer Overflow. The impact is: Code execution in context of TEE core (kernel). The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010296 |
10,625 | optee_os | 7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | core: clear the entire TA area
Previously we cleared (memset to zero) the size corresponding to code
and data segments, however the allocation for the TA is made on the
granularity of the memory pool, meaning that we did not clear all memory
and because of that we could potentially leak code and data of a
previous loa... | 1 | static struct mobj *alloc_ta_mem(size_t size)
{
#ifdef CFG_PAGED_USER_TA
return mobj_paged_alloc(size);
#else
struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr);
if (mobj)
memset(mobj_get_va(mobj, 0), 0, size);
return mobj;
#endif
}
| 333,142,874,986,827,700,000,000,000,000,000,000,000 | user_ta.c | 248,720,455,099,418,000,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2019-1010294 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010294 |
10,626 | optee_os | 95f36d661f2b75887772ea28baaad904bde96970 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/95f36d661f2b75887772ea28baaad904bde96970 | core: tee_mmu_check_access_rights() check all pages
Prior to this patch tee_mmu_check_access_rights() checks an address in
each page of a supplied range. If both the start and length of that
range is unaligned the last page in the range is sometimes not checked.
With this patch the first address of each page in the ra... | 1 | TEE_Result tee_mmu_check_access_rights(const struct user_ta_ctx *utc,
uint32_t flags, uaddr_t uaddr,
size_t len)
{
uaddr_t a;
size_t addr_incr = MIN(CORE_MMU_USER_CODE_SIZE,
CORE_MMU_USER_PARAM_SIZE);
if (ADD_OVERFLOW(uaddr, len, &a))
return TEE_ERROR_ACCESS_DENIED;
if (... | 309,046,461,438,464,900,000,000,000,000,000,000,000 | tee_mmu.c | 177,418,137,153,567,150,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010293 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Boundary crossing. The impact is: Memory corruption of the TEE itself. The component is: optee_os. The fixed version is: 3.4.0 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010293 |
10,627 | optee_os | e3adcf566cb278444830e7badfdcc3983e334fd1 | https://github.com/OP-TEE/optee_os | https://github.com/OP-TEE/optee_os/commit/e3adcf566cb278444830e7badfdcc3983e334fd1 | core: ensure that supplied range matches MOBJ
In set_rmem_param() if the MOBJ is found by the cookie it's verified to
represent non-secure shared memory. Prior to this patch the supplied
sub-range to be used of the MOBJ was not checked here and relied on
later checks further down the chain. Those checks seems to be en... | 1 | static TEE_Result set_rmem_param(const struct optee_msg_param_rmem *rmem,
struct param_mem *mem)
{
uint64_t shm_ref = READ_ONCE(rmem->shm_ref);
mem->mobj = mobj_reg_shm_get_by_cookie(shm_ref);
if (!mem->mobj)
return TEE_ERROR_BAD_PARAMETERS;
mem->offs = READ_ONCE(rmem->offs);
mem->size = READ_ONCE... | 15,438,417,749,328,557,000,000,000,000,000,000,000 | entry_std.c | 253,309,200,136,308,440,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-1010292 | Linaro/OP-TEE OP-TEE Prior to version v3.4.0 is affected by: Boundary checks. The impact is: This could lead to corruption of any memory which the TA can access. The component is: optee_os. The fixed version is: v3.4.0. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010292 |
10,628 | openmpt | 927688ddab43c2b203569de79407a899e734fabe | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe | [Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff... | 1 | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
unsigned int retval;
size_t tmpretval;
if(!file) return 0;
str = openmpt_module_get_instrument_name(file->mod,qual-1);
if(!str){
if(buff){
*buff = '\0';
}
return 0;
}
tmp... | 12,124,114,212,897,463,000,000,000,000,000,000,000 | libopenmpt_modplug.c | 274,418,101,621,125,500,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-17113 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17113 |
10,629 | openmpt | 927688ddab43c2b203569de79407a899e734fabe | https://github.com/OpenMPT/openmpt | https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe | [Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original libmodplug. This avoids potential buffer overflows in software relying on this limit instead of querying the required buff... | 1 | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_SampleName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
unsigned int retval;
size_t tmpretval;
if(!file) return 0;
str = openmpt_module_get_sample_name(file->mod,qual-1);
if(!str){
if(buff){
*buff = '\0';
}
return 0;
}
tmpretval =... | 294,694,415,044,715,340,000,000,000,000,000,000,000 | libopenmpt_modplug.c | 274,418,101,621,125,500,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-17113 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17113 |
10,636 | pam-u2f | 7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3 | https://github.com/Yubico/pam-u2f | https://github.com/Yubico/pam-u2f/commit/7db3386fcdb454e33a3ea30dcfb8e8960d4c3aa3 | Drop privileges by default when opening user-related files
The module is typically executed as root and would sometimes
open files or follow symlinks that could be controlled from the
outside.
Drop privileges to the target user before opening any files.
Fixes CVE-2019-12209.
Thanks to Matthias Gerstner of the SUSE ... | 1 | int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc,
const char **argv) {
struct passwd *pw = NULL, pw_s;
const char *user = NULL;
cfg_t cfg_st;
cfg_t *cfg = &cfg_st;
char buffer[BUFSIZE];
char *buf = NULL;
char *authfile_dir;
size_t authfile_dir_len;
int pgu_ret,... | 247,266,602,847,718,400,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2019-12209 | Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part o... | https://nvd.nist.gov/vuln/detail/CVE-2019-12209 |
10,640 | ext-http | 17137d4ab1ce81a2cee0fae842340a344ef3da83 | https://github.com/m6w6/ext-http | https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83 | fix bug #73055 | 1 | static void merge_param(HashTable *params, zval *zdata, zval ***current_param, zval ***current_args TSRMLS_DC)
{
zval **ptr, **zdata_ptr;
php_http_array_hashkey_t hkey = php_http_array_hashkey_init(0);
#if 0
{
zval tmp;
INIT_PZVAL_ARRAY(&tmp, params);
fprintf(stderr, "params = ");
zend_print_zval_r(&tmp, 1 ... | 164,440,707,986,027,160,000,000,000,000,000,000,000 | php_http_params.c | 161,963,913,583,805,180,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2016-7398 | A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests. | https://nvd.nist.gov/vuln/detail/CVE-2016-7398 |
10,641 | bdwgc | be9df82919960214ee4b9d3313523bff44fd99e1 | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1 | Fix allocation size overflows due to rounding.
* malloc.c (GC_generic_malloc): Check if the allocation size is
rounded to a smaller value.
* mallocx.c (GC_generic_malloc_ignore_off_page): Likewise. | 1 | GC_API void * GC_CALL GC_generic_malloc(size_t lb, int k)
{
void * result;
DCL_LOCK_STATE;
if (EXPECT(GC_have_errors, FALSE))
GC_print_all_errors();
GC_INVOKE_FINALIZERS();
if (SMALL_OBJ(lb)) {
LOCK();
result = GC_generic_malloc_inner((word)lb, k);
UNLOCK();
} else... | 130,048,329,424,182,730,000,000,000,000,000,000,000 | malloc.c | 323,699,899,175,429,150,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,642 | bdwgc | be9df82919960214ee4b9d3313523bff44fd99e1 | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1 | Fix allocation size overflows due to rounding.
* malloc.c (GC_generic_malloc): Check if the allocation size is
rounded to a smaller value.
* mallocx.c (GC_generic_malloc_ignore_off_page): Likewise. | 1 | GC_INNER void * GC_generic_malloc_ignore_off_page(size_t lb, int k)
{
void *result;
size_t lg;
size_t lb_rounded;
word n_blocks;
GC_bool init;
DCL_LOCK_STATE;
if (SMALL_OBJ(lb))
return(GC_generic_malloc((word)lb, k));
lg = ROUNDED_UP_GRANULES(lb);
lb_rounded = GRANULES_TO... | 174,440,046,177,171,580,000,000,000,000,000,000,000 | mallocx.c | 4,482,882,771,485,867,500,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,643 | bdwgc | 6a93f8e5bcad22137f41b6c60a1c7384baaec2b3 | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/6a93f8e5bcad22137f41b6c60a1c7384baaec2b3 | Fix calloc-related code to prevent SIZE_MAX redefinition in sys headers
* malloc.c: Include limits.h for SIZE_MAX.
* malloc.c (SIZE_MAX, calloc): Define GC_SIZE_MAX instead of SIZE_MAX. | 1 | void * calloc(size_t n, size_t lb)
{
if (lb && n > SIZE_MAX / lb)
return NULL;
# if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */
/* libpthread allocated some memory that is only pointed to by */
/* mmapped thread stacks. Make sure it's not collectable. */
... | 6,900,566,949,430,080,000,000,000,000,000,000,000 | malloc.c | 323,699,899,175,429,150,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,644 | bdwgc | 83231d0ab5ed60015797c3d1ad9056295ac3b2bb | https://github.com/ivmai/bdwgc | https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb | Speedup calloc size overflow check by preventing division if small values
* malloc.c (GC_SQRT_SIZE_MAX): New macro.
* malloc.c (calloc): Add fast initial size overflow check to avoid
integer division for reasonably small values passed. | 1 | void * calloc(size_t n, size_t lb)
{
if (lb && n > GC_SIZE_MAX / lb)
return NULL;
# if defined(GC_LINUX_THREADS) /* && !defined(USE_PROC_FOR_LIBRARIES) */
/* libpthread allocated some memory that is only pointed to by */
/* mmapped thread stacks. Make sure it's not collectable. *... | 286,136,948,008,637,870,000,000,000,000,000,000,000 | malloc.c | 209,968,943,630,946,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2673 | Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a l... | https://nvd.nist.gov/vuln/detail/CVE-2012-2673 |
10,651 | OpenJK | f61fe5f6a0419ef4a88d46a128052f2e8352e85d | https://github.com/JACoders/OpenJK | https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d | None | 1 | qboolean S_AL_Init( soundInterface_t *si )
{
#ifdef USE_OPENAL
const char* device = NULL;
const char* inputdevice = NULL;
int i;
if( !si ) {
return qfalse;
}
for (i = 0; i < MAX_RAW_STREAMS; i++) {
streamSourceHandles[i] = -1;
streamPlaying[i] = qfalse;
streamSources[i] = 0;
streamNumBuffers[i] = 0;
... | 150,263,890,990,416,820,000,000,000,000,000,000,000 | None | null | [
"CWE-269"
] | CVE-2017-6903 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | https://nvd.nist.gov/vuln/detail/CVE-2017-6903 |
10,663 | redis | 1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | Security: update Lua struct package for security.
During an auditing Apple found that the "struct" Lua package
we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains
a security problem. A bound-checking statement fails because of integer
overflow. The bug exists since we initially integrated this pac... | 1 | static int getnum (lua_State *L, const char **fmt, int df) {
if (!isdigit(**fmt)) /* no number? */
return df; /* return default value */
else {
int a = 0;
do {
if (a > (INT_MAX / 10) || a * 10 > (INT_MAX - (**fmt - '0')))
luaL_error(L, "integral size overflow");
a = a*10 + *(... | 107,382,855,017,923,050,000,000,000,000,000,000,000 | lua_struct.c | 314,192,746,630,728,530,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-14147 | An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which trigger... | https://nvd.nist.gov/vuln/detail/CVE-2020-14147 |
10,665 | redis | 52a00201fca331217c3b4b8b634f6a0f57d6b7d3 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3 | Security: fix Lua cmsgpack library stack overflow.
During an auditing effort, the Apple Vulnerability Research team discovered
a critical Redis security issue affecting the Lua scripting part of Redis.
-- Description of the problem
Several years ago I merged a pull request including many small changes at
the Lua Msg... | 1 | int mp_pack(lua_State *L) {
int nargs = lua_gettop(L);
int i;
mp_buf *buf;
if (nargs == 0)
return luaL_argerror(L, 0, "MessagePack pack needs input.");
buf = mp_buf_new(L);
for(i = 1; i <= nargs; i++) {
/* Copy argument i to top of stack for _encode processing;
*... | 31,024,745,101,585,963,000,000,000,000,000,000,000 | lua_cmsgpack.c | 174,037,834,435,693,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11218 | Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows. | https://nvd.nist.gov/vuln/detail/CVE-2018-11218 |
10,668 | FFmpeg | afc9c683ed9db01edb357bc8c19edad4282b3a97 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/afc9c683ed9db01edb357bc8c19edad4282b3a97 | avformat/asfdec: Fix DoS in asf_build_simple_index()
Fixes: Missing EOF check in loop
No testcase
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int asf_build_simple_index(AVFormatContext *s, int stream_index)
{
ff_asf_guid g;
ASFContext *asf = s->priv_data;
int64_t current_pos = avio_tell(s->pb);
int64_t ret;
if((ret = avio_seek(s->pb, asf->data_object_offset + asf->data_object_size, SEEK_SET)) < 0) {
return ret;
}
... | 185,787,158,206,728,830,000,000,000,000,000,000,000 | asfdec_f.c | 98,577,571,352,562,340,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-14223 | In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU ... | https://nvd.nist.gov/vuln/detail/CVE-2017-14223 |
10,669 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 1 | int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0;
int64_t total_samples = 0, infilesize;
RiffChunkHeader riff_chunk_header;
ChunkHeader chunk_header;
WaveHeader WaveHeader;
... | 51,282,300,993,233,380,000,000,000,000,000,000,000 | riff.c | 243,900,457,214,797,240,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
10,670 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 140,429,834,578,859,400,000,000,000,000,000,000,000 | dsdiff.c | 256,009,659,393,804,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
10,671 | WavPack | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | issue #33, sanitize size of unknown chunks before malloc() | 1 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
... | 210,565,535,641,398,630,000,000,000,000,000,000,000 | wave64.c | 79,248,399,197,577,640,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10539 | An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and sub... | https://nvd.nist.gov/vuln/detail/CVE-2018-10539 |
10,672 | file | d7cdad007c507e6c79f51f058dd77fab70ceb9f6 | https://github.com/file/file | https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6 | Stop reporting bad capabilities after the first few. | 1 | doshn(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num,
size_t size, off_t fsize, int *flags, int mach, int strtab)
{
Elf32_Shdr sh32;
Elf64_Shdr sh64;
int stripped = 1;
void *nbuf;
off_t noff, coff, name_off;
uint64_t cap_hw1 = 0; /* SunOS 5.x hardware capabilites */
uint64_t cap_sf1 = ... | 221,056,719,166,951,300,000,000,000,000,000,000,000 | readelf.c | 112,084,290,937,460,670,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2014-8116 | The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. | https://nvd.nist.gov/vuln/detail/CVE-2014-8116 |
10,673 | linux | 820f9f147dcce2602eefd9b575bbbd9ea14f0953 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953 | fs_pin: Allow for the possibility that m_list or s_list go unused.
This is needed to support lazily umounting locked mounts. Because the
entire unmounted subtree needs to stay together until there are no
users with references to any part of the subtree.
To support this guarantee that the fs_pin m_list and s_list nod... | 1 | void pin_remove(struct fs_pin *pin)
{
spin_lock(&pin_lock);
hlist_del(&pin->m_list);
hlist_del(&pin->s_list);
spin_unlock(&pin_lock);
spin_lock_irq(&pin->wait.lock);
pin->done = 1;
wake_up_locked(&pin->wait);
spin_unlock_irq(&pin->wait.lock);
} | 276,769,003,975,703,430,000,000,000,000,000,000,000 | fs_pin.c | 42,002,380,277,084,830,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-4178 | The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/li... | https://nvd.nist.gov/vuln/detail/CVE-2015-4178 |
10,674 | linux | 820f9f147dcce2602eefd9b575bbbd9ea14f0953 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953 | fs_pin: Allow for the possibility that m_list or s_list go unused.
This is needed to support lazily umounting locked mounts. Because the
entire unmounted subtree needs to stay together until there are no
users with references to any part of the subtree.
To support this guarantee that the fs_pin m_list and s_list nod... | 1 | static inline void init_fs_pin(struct fs_pin *p, void (*kill)(struct fs_pin *))
{
init_waitqueue_head(&p->wait);
p->kill = kill;
} | 755,181,173,966,157,300,000,000,000,000,000,000 | fs_pin.h | 108,333,341,808,669,470,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-4178 | The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/li... | https://nvd.nist.gov/vuln/detail/CVE-2015-4178 |
10,675 | qemu | 5193be3be35f29a35bc465036cd64ad60d43385f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=5193be3be35f29a35bc465036cd64ad60d43385f | tsc210x: fix buffer overrun on invalid state load
CVE-2013-4539
s->precision, nextprecision, function and nextfunction
come from wire and are used
as idx into resolution[] in TSC_CUT_RESOLUTION.
Validate after load to avoid buffer overrun.
Cc: Andreas Färber <afaerber@suse.de>
Signed-off-by: Michael S. Tsirkin <mst... | 1 | static int tsc210x_load(QEMUFile *f, void *opaque, int version_id)
{
TSC210xState *s = (TSC210xState *) opaque;
int64_t now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
int i;
s->x = qemu_get_be16(f);
s->y = qemu_get_be16(f);
s->pressure = qemu_get_byte(f);
s->state = qemu_get_byte(f);
s->... | 138,472,856,828,999,150,000,000,000,000,000,000,000 | tsc210x.c | 279,793,609,608,789,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4539 | Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4539 |
10,676 | FFmpeg | 7d57ca4d9a75562fa32e40766211de150f8b3ee7 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7 | avformat/rtmppkt: Check for packet size mismatches
Fixes out of array access
Found-by: Paul Cher <paulcher@icloud.com>
Reviewed-by: Paul Cher <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int rtmp_packet_read_one_chunk(URLContext *h, RTMPPacket *p,
int chunk_size, RTMPPacket **prev_pkt_ptr,
int *nb_prev_pkt, uint8_t hdr)
{
uint8_t buf[16];
int channel_id, timestamp, size;
uint32_t ts_field; // non-extended ti... | 40,257,325,432,950,084,000,000,000,000,000,000,000 | rtmppkt.c | 141,124,247,872,373,150,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10191 | Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches. | https://nvd.nist.gov/vuln/detail/CVE-2016-10191 |
10,677 | Espruino | a0d7f432abee692402c00e8b615ff5982dde9780 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780 | Fix stack size detection on Linux (fix #1427) | 1 | size_t jsuGetFreeStack() {
#ifdef ARM
void *frame = __builtin_frame_address(0);
size_t stackPos = (size_t)((char*)frame);
size_t stackEnd = (size_t)((char*)&LINKER_END_VAR);
if (stackPos < stackEnd) return 0; // should never happen, but just in case of overflow!
return stackPos - stackEnd;
#elif defined(LINU... | 330,734,069,179,736,960,000,000,000,000,000,000,000 | jsutils.c | 167,719,314,479,966,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-11590 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11590 |
10,678 | suricata | 11f3659f64a4e42e90cb3c09fcef66894205aefe | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe | teredo: be stricter on what to consider valid teredo
Invalid Teredo can lead to valid DNS traffic (or other UDP traffic)
being misdetected as Teredo. This leads to false negatives in the
UDP payload inspection.
Make the teredo code only consider a packet teredo if the encapsulated
data was decoded without any 'invali... | 1 | int DecodeTeredo(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq)
{
if (!g_teredo_enabled)
return TM_ECODE_FAILED;
uint8_t *start = pkt;
/* Is this packet to short to contain an IPv6 packet ? */
if (len < IPV6_HEADER_LEN)
return TM_ECODE_FA... | 14,393,695,795,783,696,000,000,000,000,000,000,000 | decode-teredo.c | 159,294,858,855,935,220,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
10,679 | suricata | 11f3659f64a4e42e90cb3c09fcef66894205aefe | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/11f3659f64a4e42e90cb3c09fcef66894205aefe | teredo: be stricter on what to consider valid teredo
Invalid Teredo can lead to valid DNS traffic (or other UDP traffic)
being misdetected as Teredo. This leads to false negatives in the
UDP payload inspection.
Make the teredo code only consider a packet teredo if the encapsulated
data was decoded without any 'invali... | 1 | DecodeIPV6ExtHdrs(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, uint8_t *pkt, uint16_t len, PacketQueue *pq)
{
SCEnter();
uint8_t *orig_pkt = pkt;
uint8_t nh = 0; /* careful, 0 is actually a real type */
uint16_t hdrextlen = 0;
uint16_t plen;
char dstopts = 0;
char exthdr_fh_done = 0;
... | 156,698,936,785,910,100,000,000,000,000,000,000,000 | decode-ipv6.c | 100,517,174,549,297,110,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
10,682 | qemu | afbcc40bee4ef51731102d7d4b499ee12fc182e1 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1 | parallels: Fix catalog size integer overflow (CVE-2014-0143)
The first test case would cause a huge memory allocation, leading to a
qemu abort; the second one to a too small malloc() for the catalog
(smaller than s->catalog_size), which causes a read-only out-of-bounds
array access and on big endian hosts an endianess... | 1 | static int parallels_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVParallelsState *s = bs->opaque;
int i;
struct parallels_header ph;
int ret;
bs->read_only = 1; // no write support yet
ret = bdrv_pread(bs->file, 0, &ph, sizeof(ph));
if... | 208,362,155,379,597,650,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,684 | FFmpeg | bd27a9364ca274ca97f1df6d984e88a0700fb235 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bd27a9364ca274ca97f1df6d984e88a0700fb235 | avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile
The profile field is changed by code inside and outside the decoder,
its not a reliable indicator of the internal codec state.
Maintaining it consistency with studio_profile is messy.
Its easier to just avoid it and use ... | 1 | int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
unsigned startcode, v;
int ret;
int vol = 0;
/* search next start code */
align_get_bits(gb);
// If we have not switched to studio profile than we also did not switch bps
// that ... | 81,820,958,375,911,645,000,000,000,000,000,000,000 | mpeg4videodec.c | 42,422,673,999,873,433,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-13304 | In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-13304 |
10,685 | FFmpeg | bd27a9364ca274ca97f1df6d984e88a0700fb235 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bd27a9364ca274ca97f1df6d984e88a0700fb235 | avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile
The profile field is changed by code inside and outside the decoder,
its not a reliable indicator of the internal codec state.
Maintaining it consistency with studio_profile is messy.
Its easier to just avoid it and use ... | 1 | static int er_supported(ERContext *s)
{
if(s->avctx->hwaccel && s->avctx->hwaccel->decode_slice ||
!s->cur_pic.f ||
s->cur_pic.field_picture ||
s->avctx->profile == FF_PROFILE_MPEG4_SIMPLE_STUDIO
... | 141,920,714,405,357,940,000,000,000,000,000,000,000 | error_resilience.c | 110,359,710,284,682,150,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-13304 | In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-13304 |
10,687 | file | 27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | https://github.com/file/file | https://github.com/file/file/commit/27a14bc7ba285a0a5ebfdb55e54001aa11932b08 | Correctly compute the truncated pascal string size (Francisco Alonso and
Jan Kaluza at RedHat) | 1 | */
private int
mconvert(struct magic_set *ms, struct magic *m, int flip)
{
union VALUETYPE *p = &ms->ms_value;
uint8_t type;
switch (type = cvt_flip(m->type, flip)) {
case FILE_BYTE:
cvt_8(p, m);
return 1;
case FILE_SHORT:
cvt_16(p, m);
return 1;
case FILE_LONG:
case FILE_DATE:
case FILE_LDATE:
cvt_... | 118,264,346,288,892,310,000,000,000,000,000,000,000 | softmagic.c | 243,897,300,208,014,660,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-3478 | Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion. | https://nvd.nist.gov/vuln/detail/CVE-2014-3478 |
10,690 | xserver | d2f813f7db157fc83abc4b3726821c36ee7e40b1 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db | New fbWalkCompositeRegion() function
This new function walks the composite region and calls a rectangle
compositing function on each compositing rectangle. Previously there
were buggy duplicates of this code in fbcompose.c and
miext/rootles/safealpha/safeAlphaPicture.c. | 1 | fbComposite (CARD8 op,
PicturePtr pSrc,
PicturePtr pMask,
PicturePtr pDst,
INT16 xSrc,
INT16 ySrc,
INT16 xMask,
INT16 yMask,
INT16 xDst,
INT16 yDst,
CARD16 width,
CARD16 height)
{
RegionRec region;
i... | 235,510,315,218,058,750,000,000,000,000,000,000,000 | fbpict.c | 249,309,040,865,190,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-1166 | The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition. | https://nvd.nist.gov/vuln/detail/CVE-2010-1166 |
10,691 | sleuthkit | 114cd3d0aac8bd1aeaf4b33840feb0163d342d5b | https://github.com/sleuthkit/sleuthkit | https://github.com/sleuthkit/sleuthkit/commit/114cd3d0aac8bd1aeaf4b33840feb0163d342d5b | hfs: fix keylen check in hfs_cat_traverse()
If key->key_len is 65535, calculating "uint16_t keylen' would
cause an overflow:
uint16_t keylen;
...
keylen = 2 + tsk_getu16(hfs->fs_info.endian, key->key_len)
so the code bypasses the sanity check "if (keylen > nodesize)"
which results in crash later:
./too... | 1 | hfs_cat_traverse(HFS_INFO * hfs,
TSK_HFS_BTREE_CB a_cb, void *ptr)
{
TSK_FS_INFO *fs = &(hfs->fs_info);
uint32_t cur_node; /* node id of the current node */
char *node;
uint16_t nodesize;
uint8_t is_done = 0;
tsk_error_reset();
nodesize = tsk_getu16(fs->endian, hfs->catalog_h... | 5,527,278,486,832,853,000,000,000,000,000,000,000 | hfs.c | 5,973,712,536,471,059,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-1010065 | The Sleuth Kit 4.6.0 and earlier is affected by: Integer Overflow. The impact is: Opening crafted disk image triggers crash in tsk/fs/hfs_dent.c:237. The component is: Overflow in fls tool used on HFS image. Bug is in tsk/fs/hfs.c file in function hfs_cat_traverse() in lines: 952, 1062. The attack vector is: Victim mus... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010065 |
10,692 | systemd | 505b6a61c22d5565e9308045c7b9bf79f7d0517e | https://github.com/systemd/systemd | https://cgit.freedesktop.org/systemd/systemd/commit/?id=505b6a61c22d5565e9308045c7b9bf79f7d0517e | journald: don't accept arbitrarily sized journal data fields
https://bugzilla.redhat.com/show_bug.cgi?id=858746 | 1 | void server_process_native_message(
Server *s,
const void *buffer, size_t buffer_size,
struct ucred *ucred,
struct timeval *tv,
const char *label, size_t label_len) {
struct iovec *iovec = NULL;
unsigned n = 0, m = 0, j, tn... | 206,165,572,902,001,330,000,000,000,000,000,000,000 | journald-native.c | 120,038,332,300,868,240,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4391 | Integer overflow in the valid_user_field function in journal/journald-native.c in systemd allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large journal data field, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2013-4391 |
10,693 | WavPack | 8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | issue #28, fix buffer overflows and bad allocs on corrupt CAF files | 1 | int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
uint32_t chan_chunk = 0, channel_layout = 0, bcount;
unsigned char *channel_identities = NULL;
unsigned char *channel_reorder = NULL;
int64_t total_samples = 0, infilesize;
CAFFileH... | 248,948,390,429,775,130,000,000,000,000,000,000,000 | caff.c | 180,637,342,133,898,580,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-7254 | The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-7254 |
10,697 | linux | f8bd2258e2d520dff28c855658bd24bdafb5102d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f8bd2258e2d520dff28c855658bd24bdafb5102d | remove div_long_long_rem
x86 is the only arch right now, which provides an optimized for
div_long_long_rem and it has the downside that one has to be very careful that
the divide doesn't overflow.
The API is a little akward, as the arguments for the unsigned divide are
signed. The signed version also doesn't handle ... | 1 | static inline long div_ll_X_l_rem(long long divs, long div, long *rem)
{
long dum2;
asm("divl %2":"=a"(dum2), "=d"(*rem)
: "rm"(div), "A"(divs));
return dum2;
} | 96,771,922,327,756,500,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2011-3209 | The div_long_long_rem implementation in include/asm-x86/div64.h in the Linux kernel before 2.6.26 on the x86 platform allows local users to cause a denial of service (Divide Error Fault and panic) via a clock_gettime system call. | https://nvd.nist.gov/vuln/detail/CVE-2011-3209 |
10,708 | qemu | b16c129daf0fed91febbb88de23dae8271c8898a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=b16c129daf0fed91febbb88de23dae8271c8898a | usb: ehci: fix memory leak in ehci_process_itd
While processing isochronous transfer descriptors(iTD), if the page
select(PG) field value is out of bands it will return. In this
situation the ehci's sg list is not freed thus leading to a memory
leak issue. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@36... | 1 | static int ehci_process_itd(EHCIState *ehci,
EHCIitd *itd,
uint32_t addr)
{
USBDevice *dev;
USBEndpoint *ep;
uint32_t i, len, pid, dir, devaddr, endp;
uint32_t pg, off, ptr1, ptr2, max, mult;
ehci->periodic_sched_active = PERIODIC_ACTIVE;
... | 33,948,406,223,871,267,000,000,000,000,000,000,000 | hcd-ehci.c | 236,559,692,809,978,640,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7995 | Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. | https://nvd.nist.gov/vuln/detail/CVE-2016-7995 |
10,709 | radare2 | ead645853a63bf83d8386702cad0cf23b31d7eeb | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/ead645853a63bf83d8386702cad0cf23b31d7eeb | fix #6857 | 1 | static int dex_loadcode(RBinFile *arch, RBinDexObj *bin) {
struct r_bin_t *rbin = arch->rbin;
int i;
int *methods = NULL;
int sym_count = 0;
// doublecheck??
if (!bin || bin->methods_list) {
return false;
}
bin->code_from = UT64_MAX;
bin->code_to = 0;
bin->methods_list = r_list_newf ((RListFree)free);
if ... | 59,972,490,419,326,860,000,000,000,000,000,000,000 | bin_dex.c | 330,647,830,799,263,530,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-6387 | The dex_loadcode function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6387 |
10,710 | file | 447558595a3650db2886cd2f416ad0beba965801 | https://github.com/file/file | https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801 | PR/313: Aaron Reffett: Check properly for exceeding the offset. | 1 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->st... | 271,515,507,458,392,820,000,000,000,000,000,000,000 | softmagic.c | 154,882,840,241,016,350,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2270 | softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable. | https://nvd.nist.gov/vuln/detail/CVE-2014-2270 |
10,711 | libpcap | 33834cb2a4d035b52aa2a26742f832a112e90a0a | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a | In the open request, reject capture sources that are URLs.
You shouldn't be able to ask a server to open a remote device on some
*other* server; just open it yourself.
This addresses Include Security issue F13: [libpcap] Remote Packet
Capture Daemon Allows Opening Capture URLs. | 1 | daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
char *source, size_t sourcelen)
{
char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
pcap_t *fp; // pcap_t main variable
int nread;
char sendbuf[RPCA... | 213,239,153,397,732,850,000,000,000,000,000,000,000 | daemon.c | 30,742,645,121,715,390,000,000,000,000,000,000,000 | [
"CWE-918"
] | CVE-2019-15164 | rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source. | https://nvd.nist.gov/vuln/detail/CVE-2019-15164 |
10,712 | libplist | 7391a506352c009fe044dead7baad9e22dd279ee | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee | plistutil: Prevent OOB heap buffer read by checking input size
As pointed out in #87 plistutil would do a memcmp with a heap buffer
without checking the size. If the size is less than 8 it would read
beyond the bounds of this heap buffer. This commit prevents that. | 1 | int main(int argc, char *argv[])
{
FILE *iplist = NULL;
plist_t root_node = NULL;
char *plist_out = NULL;
uint32_t size = 0;
int read_size = 0;
char *plist_entire = NULL;
struct stat filestats;
options_t *options = parse_arguments(argc, argv);
if (!options)
{
print_usage... | 113,011,307,546,855,480,000,000,000,000,000,000,000 | plistutil.c | 206,884,772,435,069,850,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-5545 | The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. | https://nvd.nist.gov/vuln/detail/CVE-2017-5545 |
10,713 | qemu | 3592fe0c919cf27a81d8e9f9b4f269553418bb01 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3592fe0c919cf27a81d8e9f9b4f269553418bb01 | char: serial: check divider value against baud base
16550A UART device uses an oscillator to generate frequencies
(baud base), which decide communication speed. This speed could
be changed by dividing it by a divider. If the divider is
greater than the baud base, speed is set to zero, leading to a
divide by zero error... | 1 | static void serial_update_parameters(SerialState *s)
{
int speed, parity, data_bits, stop_bits, frame_size;
QEMUSerialSetParams ssp;
if (s->divider == 0)
return;
/* Start bit. */
frame_size = 1;
if (s->lcr & 0x08) {
/* Parity bit. */
frame_size++;
if (s->lcr & 0... | 35,876,664,800,758,523,000,000,000,000,000,000,000 | serial.c | 36,261,584,884,359,340,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2016-8669 | The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base. | https://nvd.nist.gov/vuln/detail/CVE-2016-8669 |
10,714 | haproxy | efbbdf72992cd20458259962346044cafd9331c0 | https://github.com/haproxy/haproxy | https://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72992cd20458259962346044cafd9331c0 | BUG: dns: Prevent out-of-bounds read in dns_validate_dns_response()
We need to make sure that the record length is not making us read
past the end of the data we received.
Before this patch we could for example read the 16 bytes
corresponding to an AAAA record from the non-initialized part of
the buffer, possibly acce... | 1 | static int dns_validate_dns_response(unsigned char *resp, unsigned char *bufend,
struct dns_resolution *resolution, int max_answer_records)
{
unsigned char *reader;
char *previous_dname, tmpname[DNS_MAX_NAME_SIZE];
int len, flags, offset;
int dns_query_record_id;
int nb_saved_records;
struct dns_query_it... | 318,380,429,260,227,200,000,000,000,000,000,000,000 | dns.c | 245,344,784,117,766,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20102 | An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was l... | https://nvd.nist.gov/vuln/detail/CVE-2018-20102 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.