idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
string
file_name
string
file_hash
string
cwe
string
cve
string
cve_desc
string
nvd_url
string
211,181
php-src
a72cd07f2983dc43a6bb35209dc4687852e53c09
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=a72cd07f2983dc43a6bb35209dc4687852e53c09
Fixed bug #68665 (Invalid free)
1
apprentice_load(struct magic_set *ms, const char *fn, int action) { int errs = 0; uint32_t i, j; size_t files = 0, maxfiles = 0; char **filearr = NULL; struct stat st; struct magic_map *map; struct magic_entry_set mset[MAGIC_SETS]; php_stream *dir; php_stream_dirent d; TSRMLS_FETCH(); memset(mset, 0, size...
215852170840415887446784967790257485070
apprentice.c
136822894511518552455761565191570256868
CWE-17
CVE-2014-9426
The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via un...
https://nvd.nist.gov/vuln/detail/CVE-2014-9426
447,231
php-src
a72cd07f2983dc43a6bb35209dc4687852e53c09
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=a72cd07f2983dc43a6bb35209dc4687852e53c09
Fixed bug #68665 (Invalid free)
0
apprentice_load(struct magic_set *ms, const char *fn, int action) { int errs = 0; uint32_t i, j; size_t files = 0, maxfiles = 0; char **filearr = NULL; struct stat st; struct magic_map *map; struct magic_entry_set mset[MAGIC_SETS]; php_stream *dir; php_stream_dirent d; TSRMLS_FETCH(); memset(mset, 0, size...
156454401926797998343757810189411499663
apprentice.c
133128407981065524680771127461274572868
CWE-17
CVE-2014-9426
The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via un...
https://nvd.nist.gov/vuln/detail/CVE-2014-9426
211,473
gdk-pixbuf
4f0f465f991cd454d03189497f923eb40c170c22
http://git.gnome.org/browse/gdk-pixbuf
http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22
Avoid an integer overflow in the xbm loader At the same time, reject some silly input, such as negative width or height. https://bugzilla.gnome.org/show_bug.cgi?id=672811
1
read_bitmap_file_data (FILE *fstream, guint *width, guint *height, guchar **data, int *x_hot, int *y_hot) { guchar *bits = NULL; /* working variable */ char line[MAX_SIZE]; /* input line from file */ int size; /* number of bytes of data */ char name_...
243317071642584588963963288402776213734
io-xbm.c
331454281510719411806234723168878735596
CWE-189
CVE-2012-2370
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-2370
448,584
gdk-pixbuf
4f0f465f991cd454d03189497f923eb40c170c22
http://git.gnome.org/browse/gdk-pixbuf
http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22
Avoid an integer overflow in the xbm loader At the same time, reject some silly input, such as negative width or height. https://bugzilla.gnome.org/show_bug.cgi?id=672811
0
read_bitmap_file_data (FILE *fstream, guint *width, guint *height, guchar **data, int *x_hot, int *y_hot) { guchar *bits = NULL; /* working variable */ char line[MAX_SIZE]; /* input line from file */ int size; /* number of bytes of data */ char name_...
77339480051751804955061545708983319434
io-xbm.c
72320400164573844701740100175045869458
CWE-189
CVE-2012-2370
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-2370
211,506
zlib
eff308af425b67093bab25f80f1ae950166bece1
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
Fix a bug when getting a gzip header extra field with inflate(). If the extra field was larger than the space the user provided with inflateGetHeader(), and if multiple calls of inflate() delivered the extra header data, then there could be a buffer overflow of the provided space. This commit assures that provided spa...
1
int ZEXPORT inflate(strm, flush) z_streamp strm; int flush; { struct inflate_state FAR *state; z_const unsigned char FAR *next; /* next input */ unsigned char FAR *put; /* next output */ unsigned have, left; /* available input and output */ unsigned long hold; /* bit buffer */ ...
308042126203552622330885717948323954753
inflate.c
13307216410875362203864420162564887753
CWE-787
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the n...
https://nvd.nist.gov/vuln/detail/CVE-2022-37434
448,912
zlib
eff308af425b67093bab25f80f1ae950166bece1
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
Fix a bug when getting a gzip header extra field with inflate(). If the extra field was larger than the space the user provided with inflateGetHeader(), and if multiple calls of inflate() delivered the extra header data, then there could be a buffer overflow of the provided space. This commit assures that provided spa...
0
int ZEXPORT inflate(strm, flush) z_streamp strm; int flush; { struct inflate_state FAR *state; z_const unsigned char FAR *next; /* next input */ unsigned char FAR *put; /* next output */ unsigned have, left; /* available input and output */ unsigned long hold; /* bit buffer */ ...
77680460964707773234667939079956613143
inflate.c
53439547439920310595361050781327807541
CWE-787
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the n...
https://nvd.nist.gov/vuln/detail/CVE-2022-37434
211,563
vim
a062006b9de0b2947ab5fb376c6e67ef92a8cd69
https://github.com/vim/vim
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69
patch 8.2.3610: crash when ModeChanged triggered too early Problem: Crash when ModeChanged triggered too early. Solution: Trigger ModeChanged after setting VIsual.
1
n_start_visual_mode(int c) { #ifdef FEAT_CONCEAL int cursor_line_was_concealed = curwin->w_p_cole > 0 && conceal_cursor_line(curwin); #endif VIsual_mode = c; VIsual_active = TRUE; VIsual_reselect = TRUE; trigger_modechanged(); // Corner case: the 0 position in a tab may change when going...
184740522957607059139984101996502665794
None
CWE-122
CVE-2021-3968
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-3968
449,294
vim
a062006b9de0b2947ab5fb376c6e67ef92a8cd69
https://github.com/vim/vim
https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69
patch 8.2.3610: crash when ModeChanged triggered too early Problem: Crash when ModeChanged triggered too early. Solution: Trigger ModeChanged after setting VIsual.
0
n_start_visual_mode(int c) { #ifdef FEAT_CONCEAL int cursor_line_was_concealed = curwin->w_p_cole > 0 && conceal_cursor_line(curwin); #endif VIsual_mode = c; VIsual_active = TRUE; VIsual_reselect = TRUE; // Corner case: the 0 position in a tab may change when going into // virtualedit. ...
18013964164383096631914378209665418022
None
CWE-122
CVE-2021-3968
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-3968
211,695
vim
4c13e5e6763c6eb36a343a2b8235ea227202e952
https://github.com/vim/vim
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
patch 8.2.3949: using freed memory with /\%V Problem: Using freed memory with /\%V. Solution: Get the line again after getvvcol().
1
reg_match_visual(void) { pos_T top, bot; linenr_T lnum; colnr_T col; win_T *wp = rex.reg_win == NULL ? curwin : rex.reg_win; int mode; colnr_T start, end; colnr_T start2, end2; colnr_T cols; colnr_T curswant; // Check if the buffer is the current buffer. if (rex.reg_buf ...
213127434587581742033304075177767787021
regexp.c
154178765544405999260732501141990227321
CWE-416
CVE-2021-4192
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
450,764
vim
4c13e5e6763c6eb36a343a2b8235ea227202e952
https://github.com/vim/vim
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
patch 8.2.3949: using freed memory with /\%V Problem: Using freed memory with /\%V. Solution: Get the line again after getvvcol().
0
reg_match_visual(void) { pos_T top, bot; linenr_T lnum; colnr_T col; win_T *wp = rex.reg_win == NULL ? curwin : rex.reg_win; int mode; colnr_T start, end; colnr_T start2, end2; colnr_T cols; colnr_T curswant; // Check if the buffer is the current buffer. if (rex.reg_buf ...
273404837920170490390239404652231965596
regexp.c
323022444375597496724509829879656182542
CWE-416
CVE-2021-4192
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
211,700
linux
4fbcc1a4cb20fe26ad0225679c536c80f1648221
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION It appears that there are some buffer overflows in EVT_TRANSACTION. This happens because the length parameters that are passed to memcpy come directly from skb->data and are not guarded in any way. Signed-off-by: Jordy Zomer <jordy@pwning.systems> Revie...
1
int st21nfca_connectivity_event_received(struct nfc_hci_dev *hdev, u8 host, u8 event, struct sk_buff *skb) { int r = 0; struct device *dev = &hdev->ndev->dev; struct nfc_evt_transaction *transaction; pr_debug("connectivity gate event: %x\n", event); switch (event) { case ST21NFCA_EVT_CONNECTIVITY: r = nfc...
253634808738614127513017365541725702270
se.c
262088554020527485810277505080130104803
CWE-120
CVE-2022-26490
st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
https://nvd.nist.gov/vuln/detail/CVE-2022-26490
450,830
linux
4fbcc1a4cb20fe26ad0225679c536c80f1648221
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION It appears that there are some buffer overflows in EVT_TRANSACTION. This happens because the length parameters that are passed to memcpy come directly from skb->data and are not guarded in any way. Signed-off-by: Jordy Zomer <jordy@pwning.systems> Revie...
0
int st21nfca_connectivity_event_received(struct nfc_hci_dev *hdev, u8 host, u8 event, struct sk_buff *skb) { int r = 0; struct device *dev = &hdev->ndev->dev; struct nfc_evt_transaction *transaction; pr_debug("connectivity gate event: %x\n", event); switch (event) { case ST21NFCA_EVT_CONNECTIVITY: r = nfc...
192395528803862067074725666985010866676
se.c
50941829261793889476158524684428564511
CWE-120
CVE-2022-26490
st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
https://nvd.nist.gov/vuln/detail/CVE-2022-26490
211,842
vim
4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
patch 8.2.4436: crash with weird 'vartabstop' value Problem: Crash with weird 'vartabstop' value. Solution: Check for running into the end of the line.
1
change_indent( int type, int amount, int round, int replaced, // replaced character, put on replace stack int call_changed_bytes) // call changed_bytes() { int vcol; int last_vcol; int insstart_less; // reduction for Insstart.col int new_cursor_col; int i; char_u *...
104434622616430304167109103842435027722
indent.c
225104819640164774379021828754456921804
CWE-787
CVE-2022-0714
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
452,377
vim
4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
https://github.com/vim/vim
https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
patch 8.2.4436: crash with weird 'vartabstop' value Problem: Crash with weird 'vartabstop' value. Solution: Check for running into the end of the line.
0
change_indent( int type, int amount, int round, int replaced, // replaced character, put on replace stack int call_changed_bytes) // call changed_bytes() { int vcol; int last_vcol; int insstart_less; // reduction for Insstart.col int new_cursor_col; int i; char_u *...
281315459122812097070130024816280546627
indent.c
175343284041603087029849272826009468440
CWE-787
CVE-2022-0714
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
https://nvd.nist.gov/vuln/detail/CVE-2022-0714
211,868
nf
b1a5983f56e371046dcf164f90bfaf704d2b89f6
http://git.kernel.org/cgit/linux/kernel/git/pablo/nf
https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6
netfilter: nf_tables_offload: incorrect flow offload action array size immediate verdict expression needs to allocate one slot in the flow offload action array, however, immediate data expression does not need to do so. fwd and dup expression need to allocate one slot, this is missing. Add a new offload_action inter...
1
struct nft_flow_rule *nft_flow_rule_create(struct net *net, const struct nft_rule *rule) { struct nft_offload_ctx *ctx; struct nft_flow_rule *flow; int num_actions = 0, err; struct nft_expr *expr; expr = nft_expr_first(rule); while (nft_expr_more(rule, expr)) { if (expr->ops->offload_flags & NFT_OFFLOA...
135282973834013788624737629823587242676
nf_tables_offload.c
26603376215652964964004794041493892983
CWE-269
CVE-2022-25636
net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
https://nvd.nist.gov/vuln/detail/CVE-2022-25636
452,994
nf
b1a5983f56e371046dcf164f90bfaf704d2b89f6
http://git.kernel.org/cgit/linux/kernel/git/pablo/nf
https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6
netfilter: nf_tables_offload: incorrect flow offload action array size immediate verdict expression needs to allocate one slot in the flow offload action array, however, immediate data expression does not need to do so. fwd and dup expression need to allocate one slot, this is missing. Add a new offload_action inter...
0
struct nft_flow_rule *nft_flow_rule_create(struct net *net, const struct nft_rule *rule) { struct nft_offload_ctx *ctx; struct nft_flow_rule *flow; int num_actions = 0, err; struct nft_expr *expr; expr = nft_expr_first(rule); while (nft_expr_more(rule, expr)) { if (expr->ops->offload_action && ex...
59444629723641299753508256533223671386
nf_tables_offload.c
69217204877048087601961561157864546689
CWE-269
CVE-2022-25636
net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
https://nvd.nist.gov/vuln/detail/CVE-2022-25636
211,877
libexpat
a2fe525e660badd64b6c557c2b1ec26ddc07f6e4
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4
lib: Protect against malicious namespace declarations (CVE-2022-25236)
1
addBinding(XML_Parser parser, PREFIX *prefix, const ATTRIBUTE_ID *attId, const XML_Char *uri, BINDING **bindingsPtr) { static const XML_Char xmlNamespace[] = {ASCII_h, ASCII_t, ASCII_t, ASCII_p, ASCII_COLON, ASCII_SLASH, ASCII_SLASH, ASCII_w, ASCII_w, ASCII_w, ...
22295362737021887331084829836677682659
xmlparse.c
64970761866861782031621044957132437337
CWE-668
CVE-2022-25236
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
453,109
libexpat
a2fe525e660badd64b6c557c2b1ec26ddc07f6e4
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4
lib: Protect against malicious namespace declarations (CVE-2022-25236)
0
addBinding(XML_Parser parser, PREFIX *prefix, const ATTRIBUTE_ID *attId, const XML_Char *uri, BINDING **bindingsPtr) { static const XML_Char xmlNamespace[] = {ASCII_h, ASCII_t, ASCII_t, ASCII_p, ASCII_COLON, ASCII_SLASH, ASCII_SLASH, ASCII_w, ASCII_w, ASCII_w, ...
180909609780994811991308792390157424153
xmlparse.c
39872007825496999526918942248087494728
CWE-668
CVE-2022-25236
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
212,407
varnish-cache
c5fd097e5cce8b461c6443af02b3448baef2491d
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/c5fd097e5cce8b461c6443af02b3448baef2491d
Do not call http_hdr_flags() on pseudo-headers In http_EstimateWS(), all headers are passed to the http_isfiltered() function to calculate how many bytes is needed to serialize the entire struct http. http_isfiltered() will check the headers for whether they are going to be filtered out later and if so skip them. How...
1
http_isfiltered(const struct http *fm, unsigned u, unsigned how) { const char *e; const struct http_hdrflg *f; if (fm->hdf[u] & HDF_FILTER) return (1); e = strchr(fm->hd[u].b, ':'); if (e == NULL) return (0); f = http_hdr_flags(fm->hd[u].b, e); return (f != NULL && f->flag & how); }
811300647438513744666233377828733318
cache_http.c
145239057408586301398711991484884532857
CWE-703
CVE-2022-38150
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
https://nvd.nist.gov/vuln/detail/CVE-2022-38150
459,029
varnish-cache
c5fd097e5cce8b461c6443af02b3448baef2491d
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/c5fd097e5cce8b461c6443af02b3448baef2491d
Do not call http_hdr_flags() on pseudo-headers In http_EstimateWS(), all headers are passed to the http_isfiltered() function to calculate how many bytes is needed to serialize the entire struct http. http_isfiltered() will check the headers for whether they are going to be filtered out later and if so skip them. How...
0
http_isfiltered(const struct http *fm, unsigned u, unsigned how) { const char *e; const struct http_hdrflg *f; if (fm->hdf[u] & HDF_FILTER) return (1); if (u < HTTP_HDR_FIRST) return (0); e = strchr(fm->hd[u].b, ':'); if (e == NULL) return (0); f = http_hdr_flags(fm->hd[u].b, e); return (f != NULL && f->...
214500471714364858208416051205285025611
cache_http.c
148461925742958572930249757440638720534
CWE-703
CVE-2022-38150
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
https://nvd.nist.gov/vuln/detail/CVE-2022-38150
212,414
linux
04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
net: sched: fix use-after-free in tc_new_tfilter() Whenever tc_new_tfilter() jumps back to replay: label, we need to make sure @q and @chain local variables are cleared again, or risk use-after-free as in [1] For consistency, apply the same fix in tc_ctl_chain() BUG: KASAN: use-after-free in mini_qdisc_pair_swap+0x1...
1
static int tc_new_tfilter(struct sk_buff *skb, struct nlmsghdr *n, struct netlink_ext_ack *extack) { struct net *net = sock_net(skb->sk); struct nlattr *tca[TCA_MAX + 1]; char name[IFNAMSIZ]; struct tcmsg *t; u32 protocol; u32 prio; bool prio_allocate; u32 parent; u32 chain_index; struct Qdisc *q = NULL;...
18151855959135734228627793679159459802
cls_api.c
251903803472854915466369605008106287178
CWE-416
CVE-2022-1055
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
https://nvd.nist.gov/vuln/detail/CVE-2022-1055
459,107
linux
04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
net: sched: fix use-after-free in tc_new_tfilter() Whenever tc_new_tfilter() jumps back to replay: label, we need to make sure @q and @chain local variables are cleared again, or risk use-after-free as in [1] For consistency, apply the same fix in tc_ctl_chain() BUG: KASAN: use-after-free in mini_qdisc_pair_swap+0x1...
0
static int tc_new_tfilter(struct sk_buff *skb, struct nlmsghdr *n, struct netlink_ext_ack *extack) { struct net *net = sock_net(skb->sk); struct nlattr *tca[TCA_MAX + 1]; char name[IFNAMSIZ]; struct tcmsg *t; u32 protocol; u32 prio; bool prio_allocate; u32 parent; u32 chain_index; struct Qdisc *q; struc...
249400845678093962479611801234831545975
cls_api.c
31293344430191637657447401884064089853
CWE-416
CVE-2022-1055
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
https://nvd.nist.gov/vuln/detail/CVE-2022-1055
212,433
vim
ccfde4d028e891a41e3548323c3d47b06fb0b83e
https://github.com/vim/vim
https://github.com/vim/vim/commit/ccfde4d028e891a41e3548323c3d47b06fb0b83e
patch 9.0.0389: crash when 'tagfunc' closes the window Problem: Crash when 'tagfunc' closes the window. Solution: Bail out when the window was closed.
1
do_tag( char_u *tag, // tag (pattern) to jump to int type, int count, int forceit, // :ta with ! int verbose) // print "tag not found" message { taggy_T *tagstack = curwin->w_tagstack; int tagstackidx = curwin->w_tagstackidx; int tagstacklen = curwin->w_tagstacklen; int cur_m...
163270354086098606424218695920397836600
tag.c
256312624888395967188545141531528405807
CWE-416
CVE-2022-3134
Use After Free in GitHub repository vim/vim prior to 9.0.0389.
https://nvd.nist.gov/vuln/detail/CVE-2022-3134
459,400
vim
ccfde4d028e891a41e3548323c3d47b06fb0b83e
https://github.com/vim/vim
https://github.com/vim/vim/commit/ccfde4d028e891a41e3548323c3d47b06fb0b83e
patch 9.0.0389: crash when 'tagfunc' closes the window Problem: Crash when 'tagfunc' closes the window. Solution: Bail out when the window was closed.
0
do_tag( char_u *tag, // tag (pattern) to jump to int type, int count, int forceit, // :ta with ! int verbose) // print "tag not found" message { taggy_T *tagstack = curwin->w_tagstack; int tagstackidx = curwin->w_tagstackidx; int tagstacklen = curwin->w_tagstacklen; int cur_m...
294928399408778524511468577192657953231
None
CWE-416
CVE-2022-3134
Use After Free in GitHub repository vim/vim prior to 9.0.0389.
https://nvd.nist.gov/vuln/detail/CVE-2022-3134
212,436
linux
30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
bpf: Fix integer overflow in prealloc_elems_and_freelist() In prealloc_elems_and_freelist(), the multiplication to calculate the size passed to bpf_map_area_alloc() could lead to an integer overflow. As a result, out-of-bounds write could occur in pcpu_freelist_populate() as reported by KASAN: [...] [ 16.968613] BU...
1
static int prealloc_elems_and_freelist(struct bpf_stack_map *smap) { u32 elem_size = sizeof(struct stack_map_bucket) + smap->map.value_size; int err; smap->elems = bpf_map_area_alloc(elem_size * smap->map.max_entries, smap->map.numa_node); if (!smap->elems) return -ENOMEM; err = pcpu_freelist_init(&smap-...
178134261771669129761013963339102987528
stackmap.c
212947868785159241816012605096544782433
CWE-787
CVE-2021-41864
prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2021-41864
459,524
linux
30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
bpf: Fix integer overflow in prealloc_elems_and_freelist() In prealloc_elems_and_freelist(), the multiplication to calculate the size passed to bpf_map_area_alloc() could lead to an integer overflow. As a result, out-of-bounds write could occur in pcpu_freelist_populate() as reported by KASAN: [...] [ 16.968613] BU...
0
static int prealloc_elems_and_freelist(struct bpf_stack_map *smap) { u64 elem_size = sizeof(struct stack_map_bucket) + (u64)smap->map.value_size; int err; smap->elems = bpf_map_area_alloc(elem_size * smap->map.max_entries, smap->map.numa_node); if (!smap->elems) return -ENOMEM; err = pcpu_freelist_ini...
247842121005492107026661682297731302199
stackmap.c
198452357082465344097055898312719400384
CWE-787
CVE-2021-41864
prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2021-41864
212,834
rsyslog
0381a0de64a5a048c3d48b79055bd9848d0c7fc2
https://github.com/rsyslog/rsyslog
https://github.com/rsyslog/rsyslog/commit/0381a0de64a5a048c3d48b79055bd9848d0c7fc2
imptcp: fix Segmentation Fault when octet count is to high
1
processDataRcvd(ptcpsess_t *const __restrict__ pThis, char **buff, const int buffLen, struct syslogTime *stTime, const time_t ttGenTime, multi_submit_t *pMultiSub, unsigned *const __restrict__ pnMsgs) { DEFiRet; char c = **buff; int octatesToCopy, octatesToDiscard; if(pThis->inputState == eAtStrtFram) { if...
175845780697344678841951403700990960175
imptcp.c
66608949268386945207139768258979939814
CWE-190
CVE-2018-16881
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
https://nvd.nist.gov/vuln/detail/CVE-2018-16881
462,409
rsyslog
0381a0de64a5a048c3d48b79055bd9848d0c7fc2
https://github.com/rsyslog/rsyslog
https://github.com/rsyslog/rsyslog/commit/0381a0de64a5a048c3d48b79055bd9848d0c7fc2
imptcp: fix Segmentation Fault when octet count is to high
0
processDataRcvd(ptcpsess_t *const __restrict__ pThis, char **buff, const int buffLen, struct syslogTime *stTime, const time_t ttGenTime, multi_submit_t *pMultiSub, unsigned *const __restrict__ pnMsgs) { DEFiRet; char c = **buff; int octatesToCopy, octatesToDiscard; if(pThis->inputState == eAtStrtFram) { if...
319180109338452321529530788318348241217
imptcp.c
222511081390723120608536252618686301143
CWE-190
CVE-2018-16881
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
https://nvd.nist.gov/vuln/detail/CVE-2018-16881
212,857
vim
4f1b083be43f351bc107541e7b0c9655a5d2c0bb
https://github.com/vim/vim
https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb
patch 9.0.0322: crash when no errors and 'quickfixtextfunc' is set Problem: Crash when no errors and 'quickfixtextfunc' is set. Solution: Do not handle errors if there aren't any.
1
qf_fill_buffer(qf_list_T *qfl, buf_T *buf, qfline_T *old_last, int qf_winid) { linenr_T lnum; qfline_T *qfp; int old_KeyTyped = KeyTyped; list_T *qftf_list = NULL; listitem_T *qftf_li = NULL; if (old_last == NULL) { if (buf != curbuf) { internal_error("qf_fill_buffer()"); retur...
19896236176049682773029755500370526703
quickfix.c
67097038911895244025002740290880368768
CWE-416
CVE-2022-3037
Use After Free in GitHub repository vim/vim prior to 9.0.0322.
https://nvd.nist.gov/vuln/detail/CVE-2022-3037
462,511
vim
4f1b083be43f351bc107541e7b0c9655a5d2c0bb
https://github.com/vim/vim
https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb
patch 9.0.0322: crash when no errors and 'quickfixtextfunc' is set Problem: Crash when no errors and 'quickfixtextfunc' is set. Solution: Do not handle errors if there aren't any.
0
qf_fill_buffer(qf_list_T *qfl, buf_T *buf, qfline_T *old_last, int qf_winid) { linenr_T lnum; qfline_T *qfp; int old_KeyTyped = KeyTyped; list_T *qftf_list = NULL; listitem_T *qftf_li = NULL; if (old_last == NULL) { if (buf != curbuf) { internal_error("qf_fill_buffer()"); retur...
333242954823260199301291407740047378845
quickfix.c
221790887990910120742119728344121157301
CWE-416
CVE-2022-3037
Use After Free in GitHub repository vim/vim prior to 9.0.0322.
https://nvd.nist.gov/vuln/detail/CVE-2022-3037
212,934
cyrus-imapd
621f9e41465b521399f691c241181300fab55995
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/621f9e41465b521399f691c241181300fab55995
annotate: don't allow everyone to write shared server entries
1
static int write_entry(struct mailbox *mailbox, unsigned int uid, const char *entry, const char *userid, const struct buf *value, int ignorequota, int silent, ...
63211042070136121773849314849857565491
annotate.c
152032054661376167383830098805318046193
CWE-732
CVE-2021-32056
Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall.
https://nvd.nist.gov/vuln/detail/CVE-2021-32056
463,134
cyrus-imapd
621f9e41465b521399f691c241181300fab55995
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/621f9e41465b521399f691c241181300fab55995
annotate: don't allow everyone to write shared server entries
0
static int write_entry(struct mailbox *mailbox, unsigned int uid, const char *entry, const char *userid, const struct buf *value, int ignorequota, int silent, ...
337608514204534148463343228875212022606
annotate.c
55084981439029014796527313329432397099
CWE-732
CVE-2021-32056
Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall.
https://nvd.nist.gov/vuln/detail/CVE-2021-32056
212,955
linux
82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
ax25: Fix UAF bugs in ax25 timers There are race conditions that may lead to UAF bugs in ax25_heartbeat_expiry(), ax25_t1timer_expiry(), ax25_t2timer_expiry(), ax25_t3timer_expiry() and ax25_idletimer_expiry(), when we call ax25_release() to deallocate ax25_dev. One of the UAF bugs caused by ax25_release() is shown b...
1
static int ax25_release(struct socket *sock) { struct sock *sk = sock->sk; ax25_cb *ax25; ax25_dev *ax25_dev; if (sk == NULL) return 0; sock_hold(sk); lock_sock(sk); sock_orphan(sk); ax25 = sk_to_ax25(sk); ax25_dev = ax25->ax25_dev; if (sk->sk_type == SOCK_SEQPACKET) { switch (ax25->state) { case AX2...
322863638930156349228190868934879958122
af_ax25.c
161595370162210735322175103800372569534
CWE-476
CVE-2022-1205
A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.
https://nvd.nist.gov/vuln/detail/CVE-2022-1205
463,476
linux
82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0
ax25: Fix UAF bugs in ax25 timers There are race conditions that may lead to UAF bugs in ax25_heartbeat_expiry(), ax25_t1timer_expiry(), ax25_t2timer_expiry(), ax25_t3timer_expiry() and ax25_idletimer_expiry(), when we call ax25_release() to deallocate ax25_dev. One of the UAF bugs caused by ax25_release() is shown b...
0
static int ax25_release(struct socket *sock) { struct sock *sk = sock->sk; ax25_cb *ax25; ax25_dev *ax25_dev; if (sk == NULL) return 0; sock_hold(sk); lock_sock(sk); sock_orphan(sk); ax25 = sk_to_ax25(sk); ax25_dev = ax25->ax25_dev; if (sk->sk_type == SOCK_SEQPACKET) { switch (ax25->state) { case AX2...
148812270576683691154381215671514833423
af_ax25.c
305687071181329049431144170214324654974
CWE-476
CVE-2022-1205
A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.
https://nvd.nist.gov/vuln/detail/CVE-2022-1205
213,037
php-src
2bcbc95f033c31b00595ed39f79c3a99b4ed0501
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=2bcbc95f033c31b00595ed39f79c3a99b4ed0501
Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`)
1
mbfl_filt_conv_big5_wchar(int c, mbfl_convert_filter *filter) { int k; int c1, w, c2; switch (filter->status) { case 0: if (filter->from->no_encoding == mbfl_no_encoding_cp950) { c1 = 0x80; } else { c1 = 0xa0; } if (c >= 0 && c <= 0x80) { /* latin */ CK((*filter->output_function)(c, filter->data)...
8283586201644887300915898295948875795
mbfilter_big5.c
67113767760618335945735132719612525083
CWE-125
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-7060
464,942
php-src
2bcbc95f033c31b00595ed39f79c3a99b4ed0501
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=2bcbc95f033c31b00595ed39f79c3a99b4ed0501
Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`)
0
mbfl_filt_conv_big5_wchar(int c, mbfl_convert_filter *filter) { int k; int c1, w, c2; switch (filter->status) { case 0: if (filter->from->no_encoding == mbfl_no_encoding_cp950) { c1 = 0x80; } else { c1 = 0xa0; } if (c >= 0 && c <= 0x80) { /* latin */ CK((*filter->output_function)(c, filter->data)...
324298547167958214830404594575086371894
mbfilter_big5.c
135358838595920427772392870415942108469
CWE-125
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-7060
213,075
linux
d270453a0d9ec10bb8a802a142fb1b3601a83098
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs There are destructive operations such as nfcmrvl_fw_dnld_abort and gpio_free in nfcmrvl_nci_unregister_dev. The resources such as firmware, gpio and so on could be destructed while the upper layer functions such as nfcmrvl_f...
1
void nfcmrvl_nci_unregister_dev(struct nfcmrvl_private *priv) { struct nci_dev *ndev = priv->ndev; if (priv->ndev->nfc_dev->fw_download_in_progress) nfcmrvl_fw_dnld_abort(priv); nfcmrvl_fw_dnld_deinit(priv); if (gpio_is_valid(priv->config.reset_n_io)) gpio_free(priv->config.reset_n_io); nci_unregister_devi...
80022393435189393698798858771068403226
main.c
269589724165464795755961413543377431257
CWE-416
CVE-2022-1734
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
465,854
linux
d270453a0d9ec10bb8a802a142fb1b3601a83098
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs There are destructive operations such as nfcmrvl_fw_dnld_abort and gpio_free in nfcmrvl_nci_unregister_dev. The resources such as firmware, gpio and so on could be destructed while the upper layer functions such as nfcmrvl_f...
0
void nfcmrvl_nci_unregister_dev(struct nfcmrvl_private *priv) { struct nci_dev *ndev = priv->ndev; nci_unregister_device(ndev); if (priv->ndev->nfc_dev->fw_download_in_progress) nfcmrvl_fw_dnld_abort(priv); nfcmrvl_fw_dnld_deinit(priv); if (gpio_is_valid(priv->config.reset_n_io)) gpio_free(priv->config.rese...
316889922482617255369760811895973398042
main.c
72783035661229533043408251312926412443
CWE-416
CVE-2022-1734
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
https://nvd.nist.gov/vuln/detail/CVE-2022-1734
213,370
glib
d553d92d6e9f53cbe5a34166fcb919ba652c6a8e
https://gitlab.gnome.org/GNOME/glib
https://gitlab.gnome.org/GNOME/glib/commit/d553d92d6e9f53cbe5a34166fcb919ba652c6a8e
gsocketclient: Fix criticals This ensures the parent GTask is kept alive as long as an enumeration is running and trying to connect. Closes #1646 Closes #1649
1
g_socket_client_connected_callback (GObject *source, GAsyncResult *result, gpointer user_data) { ConnectionAttempt *attempt = user_data; GSocketClientAsyncConnectData *data = attempt->data; GSList *l; GError *error = NULL; GProxy *proxy; const gchar *protocol; /* data is NULL on...
303931634452049999477477859565079753152
gsocketclient.c
112189477762116433441013263383719019263
CWE-754
CVE-2019-9633
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrate...
https://nvd.nist.gov/vuln/detail/CVE-2019-9633
468,349
glib
d553d92d6e9f53cbe5a34166fcb919ba652c6a8e
https://gitlab.gnome.org/GNOME/glib
https://gitlab.gnome.org/GNOME/glib/commit/d553d92d6e9f53cbe5a34166fcb919ba652c6a8e
gsocketclient: Fix criticals This ensures the parent GTask is kept alive as long as an enumeration is running and trying to connect. Closes #1646 Closes #1649
0
g_socket_client_connected_callback (GObject *source, GAsyncResult *result, gpointer user_data) { ConnectionAttempt *attempt = user_data; GSocketClientAsyncConnectData *data = attempt->data; GSList *l; GError *error = NULL; GProxy *proxy; const gchar *protocol; if (g_cancellable_...
284257451684326472377624066772232784907
gsocketclient.c
157905572963596557383512485968044873989
CWE-754
CVE-2019-9633
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrate...
https://nvd.nist.gov/vuln/detail/CVE-2019-9633
213,515
vim
5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
patch 8.2.4563: "z=" in Visual mode may go beyond the end of the line Problem: "z=" in Visual mode may go beyond the end of the line. Solution: Adjust "badlen".
1
spell_suggest(int count) { char_u *line; pos_T prev_cursor = curwin->w_cursor; char_u wcopy[MAXWLEN + 2]; char_u *p; int i; int c; suginfo_T sug; suggest_T *stp; int mouse_used; int need_cap; int limit; int selected = count; int badlen = 0; int msg_scroll_...
283321822802394416488141327214287342104
spellsuggest.c
284064000006918275605147443263550733278
CWE-787
CVE-2022-0943
Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
471,902
vim
5c68617d395f9d7b824f68475b24ce3e38d653a3
https://github.com/vim/vim
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
patch 8.2.4563: "z=" in Visual mode may go beyond the end of the line Problem: "z=" in Visual mode may go beyond the end of the line. Solution: Adjust "badlen".
0
spell_suggest(int count) { char_u *line; pos_T prev_cursor = curwin->w_cursor; char_u wcopy[MAXWLEN + 2]; char_u *p; int i; int c; suginfo_T sug; suggest_T *stp; int mouse_used; int need_cap; int limit; int selected = count; int badlen = 0; int msg_scroll_...
210769611717793726730537343470434116318
spellsuggest.c
285304759407649884654167568930599876914
CWE-787
CVE-2022-0943
Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
https://nvd.nist.gov/vuln/detail/CVE-2022-0943
213,528
linux
3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
cgroup: verify that source is a string The following sequence can be used to trigger a UAF: int fscontext_fd = fsopen("cgroup"); int fd_null = open("/dev/null, O_RDONLY); int fsconfig(fscontext_fd, FSCONFIG_SET_FD, "source", fd_null); close_range(3, ~0U, 0); The cgroup v1 specific fs parser expects a...
1
int cgroup1_parse_param(struct fs_context *fc, struct fs_parameter *param) { struct cgroup_fs_context *ctx = cgroup_fc2context(fc); struct cgroup_subsys *ss; struct fs_parse_result result; int opt, i; opt = fs_parse(fc, cgroup1_fs_parameters, param, &result); if (opt == -ENOPARAM) { if (strcmp(param->key, "sou...
2447930720327269598694221319559062155
cgroup-v1.c
304027161926251240992448703175506915313
CWE-416
CVE-2021-4154
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
https://nvd.nist.gov/vuln/detail/CVE-2021-4154
472,123
linux
3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
cgroup: verify that source is a string The following sequence can be used to trigger a UAF: int fscontext_fd = fsopen("cgroup"); int fd_null = open("/dev/null, O_RDONLY); int fsconfig(fscontext_fd, FSCONFIG_SET_FD, "source", fd_null); close_range(3, ~0U, 0); The cgroup v1 specific fs parser expects a...
0
int cgroup1_parse_param(struct fs_context *fc, struct fs_parameter *param) { struct cgroup_fs_context *ctx = cgroup_fc2context(fc); struct cgroup_subsys *ss; struct fs_parse_result result; int opt, i; opt = fs_parse(fc, cgroup1_fs_parameters, param, &result); if (opt == -ENOPARAM) { if (strcmp(param->key, "sou...
334870785845210346899642963550735857549
cgroup-v1.c
43168048456517404384153301721017353964
CWE-416
CVE-2021-4154
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
https://nvd.nist.gov/vuln/detail/CVE-2021-4154
213,998
libtpms
ea62fd9679f8c6fc5e79471b33cfbd8227bfed72
https://github.com/stefanberger/libtpms
https://github.com/stefanberger/libtpms/commit/ea62fd9679f8c6fc5e79471b33cfbd8227bfed72
tpm2: Initialize a whole OBJECT before using it Initialize a whole OBJECT before using it. This is necessary since an OBJECT may also be used as a HASH_OBJECT via the ANY_OBJECT union and that HASH_OBJECT can leave bad size inidicators in TPM2B buffer in the OBJECT. To get rid of this problem we reset the whole OBJECT...
1
FindEmptyObjectSlot( TPMI_DH_OBJECT *handle // OUT: (optional) ) { UINT32 i; OBJECT *object; for(i = 0; i < MAX_LOADED_OBJECTS; i++) { object = &s_objects[i]; if(object->attributes.occupied == CLEAR) { if(handle) *handle = i + TRANSIENT_F...
267307307566893737550652048570735094605
Object.c
21721239087984404174741324804041111077
CWE-119
CVE-2021-3746
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availab...
https://nvd.nist.gov/vuln/detail/CVE-2021-3746
474,434
libtpms
ea62fd9679f8c6fc5e79471b33cfbd8227bfed72
https://github.com/stefanberger/libtpms
https://github.com/stefanberger/libtpms/commit/ea62fd9679f8c6fc5e79471b33cfbd8227bfed72
tpm2: Initialize a whole OBJECT before using it Initialize a whole OBJECT before using it. This is necessary since an OBJECT may also be used as a HASH_OBJECT via the ANY_OBJECT union and that HASH_OBJECT can leave bad size inidicators in TPM2B buffer in the OBJECT. To get rid of this problem we reset the whole OBJECT...
0
FindEmptyObjectSlot( TPMI_DH_OBJECT *handle // OUT: (optional) ) { UINT32 i; OBJECT *object; for(i = 0; i < MAX_LOADED_OBJECTS; i++) { object = &s_objects[i]; if(object->attributes.occupied == CLEAR) { if(handle) *handle = i + TRANSIENT_F...
327698206124968939324347029407328822774
Object.c
122617348389867631937316179213551374827
CWE-119
CVE-2021-3746
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availab...
https://nvd.nist.gov/vuln/detail/CVE-2021-3746
214,124
chafa
e6ce3746cdcf0836b9dae659a5aed15d73a080d8
https://github.com/hpjansson/chafa
https://github.com/hpjansson/chafa/commit/e6ce3746cdcf0836b9dae659a5aed15d73a080d8
libnsgif: fix oob in lzw_decode
1
lzw_result lzw_decode(struct lzw_ctx *ctx, const uint8_t ** const stack_pos_out) { lzw_result res; uint32_t code_new; uint32_t code_out; uint8_t last_value; uint8_t *stack_pos = ctx->stack_base; uint32_t clear_code = ctx->clear_code; uint32_t current_entry = ctx->current_entry; struct lzw_dictionary_entry * c...
197312030105469318680562726195282198881
lzw.c
206609516216923718063023254663769273017
CWE-125
CVE-2022-2061
Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2061
475,987
chafa
e6ce3746cdcf0836b9dae659a5aed15d73a080d8
https://github.com/hpjansson/chafa
https://github.com/hpjansson/chafa/commit/e6ce3746cdcf0836b9dae659a5aed15d73a080d8
libnsgif: fix oob in lzw_decode
0
lzw_result lzw_decode(struct lzw_ctx *ctx, const uint8_t ** const stack_pos_out) { lzw_result res; uint32_t code_new; uint32_t code_out; uint8_t last_value; uint8_t *stack_pos = ctx->stack_base; uint32_t clear_code = ctx->clear_code; uint32_t current_entry = ctx->current_entry; struct lzw_dictionary_entry * c...
232258018845507324994493987384082077230
lzw.c
168965779407481929590316655829608211083
CWE-125
CVE-2022-2061
Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2061
214,276
linux
fa40d9734a57bcbfa79a280189799f76c88f7bb0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
tipc: fix size validations for the MSG_CRYPTO type The function tipc_crypto_key_rcv is used to parse MSG_CRYPTO messages to receive keys from other nodes in the cluster in order to decrypt any further messages from them. This patch verifies that any supplied sizes in the message body are valid for the received message...
1
static bool tipc_crypto_key_rcv(struct tipc_crypto *rx, struct tipc_msg *hdr) { struct tipc_crypto *tx = tipc_net(rx->net)->crypto_tx; struct tipc_aead_key *skey = NULL; u16 key_gen = msg_key_gen(hdr); u16 size = msg_data_sz(hdr); u8 *data = msg_data(hdr); spin_lock(&rx->lock); if (unlikely(rx->skey || (key_gen...
150450145750082729683403565650901445106
crypto.c
58733917967082493268842355411939930161
CWE-20
CVE-2021-43267
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
https://nvd.nist.gov/vuln/detail/CVE-2021-43267
477,273
linux
fa40d9734a57bcbfa79a280189799f76c88f7bb0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0
tipc: fix size validations for the MSG_CRYPTO type The function tipc_crypto_key_rcv is used to parse MSG_CRYPTO messages to receive keys from other nodes in the cluster in order to decrypt any further messages from them. This patch verifies that any supplied sizes in the message body are valid for the received message...
0
static bool tipc_crypto_key_rcv(struct tipc_crypto *rx, struct tipc_msg *hdr) { struct tipc_crypto *tx = tipc_net(rx->net)->crypto_tx; struct tipc_aead_key *skey = NULL; u16 key_gen = msg_key_gen(hdr); u16 size = msg_data_sz(hdr); u8 *data = msg_data(hdr); unsigned int keylen; /* Verify whether the size can exi...
21444025468428283247999063273803236471
crypto.c
97644738698722030133364122587095840919
CWE-20
CVE-2021-43267
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
https://nvd.nist.gov/vuln/detail/CVE-2021-43267
214,282
radare2
9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
Fix oobread segfault in java arith8.class ##crash * Reported by Cen Zhang via huntr.dev
1
R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) { RBinJavaClassesAttribute *icattr; RBinJavaAttrInfo *attr = NULL; RBinJavaCPTypeObj *obj; ut32 i = 0; ut64 offset = 0, curpos; attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset); offs...
64487889579921550880626488390413278294
None
CWE-787
CVE-2022-0518
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0518
477,380
radare2
9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
Fix oobread segfault in java arith8.class ##crash * Reported by Cen Zhang via huntr.dev
0
R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) { RBinJavaClassesAttribute *icattr; RBinJavaAttrInfo *attr = NULL; RBinJavaCPTypeObj *obj; ut32 i = 0; ut64 offset = 0, curpos; attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset); offs...
64877756474443733674480622739162380352
None
CWE-787
CVE-2022-0518
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0518
214,335
ceph
be7679007c3dfab3e19c22c38c36ccac91828e3b
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/be7679007c3dfab3e19c22c38c36ccac91828e3b
rgw: reject control characters in response-header actions S3 GetObject permits overriding response header values, but those inputs need to be validated to insure only characters that are valid in an HTTP header value are present. Credit: Initial vulnerability discovery by William Bowling (@wcbowling) Credit: Further ...
1
int RGWGetObj_ObjStore_S3::send_response_data(bufferlist& bl, off_t bl_ofs, off_t bl_len) { const char *content_type = NULL; string content_type_str; map<string, string> response_attrs; map<string, string>::iterator riter; bufferlist metadata_bl; string expires = get_s3_expiration_header(s, last...
252320959275346519647300715417843120718
rgw_rest_s3.cc
121704064633287557349192949015382644860
CWE-79
CVE-2020-1760
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
https://nvd.nist.gov/vuln/detail/CVE-2020-1760
477,800
ceph
be7679007c3dfab3e19c22c38c36ccac91828e3b
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/be7679007c3dfab3e19c22c38c36ccac91828e3b
rgw: reject control characters in response-header actions S3 GetObject permits overriding response header values, but those inputs need to be validated to insure only characters that are valid in an HTTP header value are present. Credit: Initial vulnerability discovery by William Bowling (@wcbowling) Credit: Further ...
0
int RGWGetObj_ObjStore_S3::send_response_data(bufferlist& bl, off_t bl_ofs, off_t bl_len) { const char *content_type = NULL; string content_type_str; map<string, string> response_attrs; map<string, string>::iterator riter; bufferlist metadata_bl; string expires = get_s3_expiration_header(s, last...
262581748288231212684344001949485433363
rgw_rest_s3.cc
18601801279536370570230302891439737230
CWE-79
CVE-2020-1760
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
https://nvd.nist.gov/vuln/detail/CVE-2020-1760
214,339
linux
f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow The kvmppc_rtas_hcall() sets the host rtas_args.rets pointer based on the rtas_args.nargs that was provided by the guest. That guest nargs value is not range checked, so the guest can cause the host rets pointer to be pointed outside the args array. The individual rtas...
1
int kvmppc_rtas_hcall(struct kvm_vcpu *vcpu) { struct rtas_token_definition *d; struct rtas_args args; rtas_arg_t *orig_rets; gpa_t args_phys; int rc; /* * r4 contains the guest physical address of the RTAS args * Mask off the top 4 bits since this is a guest real address */ args_phys = kvmppc_get_gpr(vcp...
66579788869283176691450230454774242085
book3s_rtas.c
244969410022637408362665450874858593503
CWE-787
CVE-2021-37576
arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
https://nvd.nist.gov/vuln/detail/CVE-2021-37576
477,811
linux
f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow The kvmppc_rtas_hcall() sets the host rtas_args.rets pointer based on the rtas_args.nargs that was provided by the guest. That guest nargs value is not range checked, so the guest can cause the host rets pointer to be pointed outside the args array. The individual rtas...
0
int kvmppc_rtas_hcall(struct kvm_vcpu *vcpu) { struct rtas_token_definition *d; struct rtas_args args; rtas_arg_t *orig_rets; gpa_t args_phys; int rc; /* * r4 contains the guest physical address of the RTAS args * Mask off the top 4 bits since this is a guest real address */ args_phys = kvmppc_get_gpr(vcp...
270253933279643819807414798855847113264
book3s_rtas.c
244634684304024017969354424959522055540
CWE-787
CVE-2021-37576
arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
https://nvd.nist.gov/vuln/detail/CVE-2021-37576
214,358
clamav-devel
224fee54dd6cd8933d7007331ec2bfca0398d4b4
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=224fee54dd6cd8933d7007331ec2bfca0398d4b4
libclamav/mspack.c: fix Quantum decompressor (bb#1771)
1
int qtm_decompress(struct qtm_stream *qtm, off_t out_bytes) { unsigned int frame_start, frame_end, window_posn, match_offset, range; unsigned char *window, *i_ptr, *i_end, *runsrc, *rundest; int i, j, selector, extra, sym, match_length, ret; unsigned short H, L, C, symf; register unsigned int bit_buffer; r...
291050376752284006088755347145639053650
mspack.c
137114659534783781079186144852150621076
CWE-20
CVE-2010-1311
The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format. NOTE: some of these details are obtained from third party information.
https://nvd.nist.gov/vuln/detail/CVE-2010-1311
477,946
clamav-devel
224fee54dd6cd8933d7007331ec2bfca0398d4b4
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=224fee54dd6cd8933d7007331ec2bfca0398d4b4
libclamav/mspack.c: fix Quantum decompressor (bb#1771)
0
int qtm_decompress(struct qtm_stream *qtm, off_t out_bytes) { unsigned int frame_start, frame_end, window_posn, match_offset, range; unsigned char *window, *i_ptr, *i_end, *runsrc, *rundest; int i, j, selector, extra, sym, match_length, ret; unsigned short H, L, C, symf; register unsigned int bit_buffer; r...
309561544522405112370599990059884786931
mspack.c
294647704290965311324683497678599566631
CWE-20
CVE-2010-1311
The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format. NOTE: some of these details are obtained from third party information.
https://nvd.nist.gov/vuln/detail/CVE-2010-1311
214,948
nagioscore
b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76
https://github.com/NagiosEnterprises/nagioscore
https://github.com/NagiosEnterprises/nagioscore/commit/b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76
merge accidental master PR (#553) into maint and fix changelog merge conflict
1
static int qh_help(int sd, char *buf, unsigned int len) { struct query_handler *qh = NULL; if (!*buf || !strcmp(buf, "help")) { nsock_printf_nul(sd, " help <name> show help for handler <name>\n" " help list list registered handlers\n"); return 0; } if (!strcmp(buf, "list")) { for (qh = qhandl...
94205848469413247134990431510795041073
query-handler.c
69411467652185615530893490033539842403
CWE-476
CVE-2018-13441
qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-13441
481,787
nagioscore
b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76
https://github.com/NagiosEnterprises/nagioscore
https://github.com/NagiosEnterprises/nagioscore/commit/b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76
merge accidental master PR (#553) into maint and fix changelog merge conflict
0
static int qh_help(int sd, char *buf, unsigned int len) { struct query_handler *qh = NULL; if (buf == NULL || !strcmp(buf, "help")) { nsock_printf_nul(sd, " help <name> show help for handler <name>\n" " help list list registered handlers\n"); return 0; } if (!strcmp(buf, "list")) { for (qh = ...
205155132129673453942496407625358391443
query-handler.c
275184931270866221094094086326042798019
CWE-476
CVE-2018-13441
qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
https://nvd.nist.gov/vuln/detail/CVE-2018-13441
214,997
liblouis
2e4772befb2b1c37cb4b9d6572945115ee28630a
https://github.com/liblouis/liblouis
https://github.com/liblouis/liblouis/commit/2e4772befb2b1c37cb4b9d6572945115ee28630a
Prevent an invalid memory writes in compileRule Thanks to Han Zheng for reporting it Fixes #1214
1
compileRule(FileInfo *file, TranslationTableHeader **table, DisplayTableHeader **displayTable, const MacroList **inScopeMacros) { CharsString token; TranslationTableOpcode opcode; CharsString ruleChars; CharsString ruleDots; CharsString cells; CharsString scratchPad; CharsString emphClass; TranslationTableCha...
114188111189139492438388270487144198902
compileTranslationTable.c
130160890521779483138755278607355501086
CWE-787
CVE-2022-31783
Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace.
https://nvd.nist.gov/vuln/detail/CVE-2022-31783
482,533
liblouis
2e4772befb2b1c37cb4b9d6572945115ee28630a
https://github.com/liblouis/liblouis
https://github.com/liblouis/liblouis/commit/2e4772befb2b1c37cb4b9d6572945115ee28630a
Prevent an invalid memory writes in compileRule Thanks to Han Zheng for reporting it Fixes #1214
0
compileRule(FileInfo *file, TranslationTableHeader **table, DisplayTableHeader **displayTable, const MacroList **inScopeMacros) { CharsString token; TranslationTableOpcode opcode; CharsString ruleChars; CharsString ruleDots; CharsString cells; CharsString scratchPad; CharsString emphClass; TranslationTableCha...
188995041946566375099409962387038802381
compileTranslationTable.c
129515444966510079462991982245291196170
CWE-787
CVE-2022-31783
Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace.
https://nvd.nist.gov/vuln/detail/CVE-2022-31783
215,038
gst-plugins-good
b31c504645a814c59d91d49e4fe218acaf93f4ca
https://github.com/GStreamer/gst-plugins-good
https://github.com/GStreamer/gst-plugins-good/commit/b31c504645a814c59d91d49e4fe218acaf93f4ca
flxdec: Don't unref() parent in the chain function We don't own the reference here, it is owned by the caller and given to us for the scope of this function. Leftover mistake from 0.10 porting. https://bugzilla.gnome.org/show_bug.cgi?id=774897
1
gst_flxdec_chain (GstPad * pad, GstObject * parent, GstBuffer * buf) { GstCaps *caps; guint avail; GstFlowReturn res = GST_FLOW_OK; GstFlxDec *flxdec; FlxHeader *flxh; g_return_val_if_fail (buf != NULL, GST_FLOW_ERROR); flxdec = (GstFlxDec *) parent; g_return_val_if_fail (flxdec != NULL, GST_FLOW_ERRO...
293682781429111556527181973502820056353
gstflxdec.c
257993996858330004218595538099349772474
CWE-125
CVE-2016-9810
The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
https://nvd.nist.gov/vuln/detail/CVE-2016-9810
482,692
gst-plugins-good
b31c504645a814c59d91d49e4fe218acaf93f4ca
https://github.com/GStreamer/gst-plugins-good
https://github.com/GStreamer/gst-plugins-good/commit/b31c504645a814c59d91d49e4fe218acaf93f4ca
flxdec: Don't unref() parent in the chain function We don't own the reference here, it is owned by the caller and given to us for the scope of this function. Leftover mistake from 0.10 porting. https://bugzilla.gnome.org/show_bug.cgi?id=774897
0
gst_flxdec_chain (GstPad * pad, GstObject * parent, GstBuffer * buf) { GstCaps *caps; guint avail; GstFlowReturn res = GST_FLOW_OK; GstFlxDec *flxdec; FlxHeader *flxh; g_return_val_if_fail (buf != NULL, GST_FLOW_ERROR); flxdec = (GstFlxDec *) parent; g_return_val_if_fail (flxdec != NULL, GST_FLOW_ERRO...
307699482792832838844638071066338187796
gstflxdec.c
15220895690601023240129213899493293437
CWE-125
CVE-2016-9810
The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
https://nvd.nist.gov/vuln/detail/CVE-2016-9810
215,103
mongo
a5e2f9b0a236462a6d1ca129583c617f111367b4
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/a5e2f9b0a236462a6d1ca129583c617f111367b4
SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards (cherry picked from commit f3604b901d688c194de5e430c7fbab060c9dc8e0)
1
createRandomCursorExecutor(const CollectionPtr& coll, const boost::intrusive_ptr<ExpressionContext>& expCtx, long long sampleSize, long long numRecords, boost::optional<BucketUnpacker> bucketUnpacker) { Opera...
101223003381904306346527857489543984398
None
CWE-617
CVE-2021-32037
An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e...
https://nvd.nist.gov/vuln/detail/CVE-2021-32037
483,469
mongo
a5e2f9b0a236462a6d1ca129583c617f111367b4
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/a5e2f9b0a236462a6d1ca129583c617f111367b4
SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards (cherry picked from commit f3604b901d688c194de5e430c7fbab060c9dc8e0)
0
createRandomCursorExecutor(const CollectionPtr& coll, const boost::intrusive_ptr<ExpressionContext>& expCtx, long long sampleSize, long long numRecords, boost::optional<BucketUnpacker> bucketUnpacker) { Opera...
53510909926140160570175197476495085795
None
CWE-617
CVE-2021-32037
An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e...
https://nvd.nist.gov/vuln/detail/CVE-2021-32037
215,312
linux-2.6
9926e4c74300c4b31dee007298c6475d33369df0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0
CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix As discovered here today, the change in Kernel 2.6.17 intended to inhibit users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by "cheating" and setting it to 1 in such a case, does not make a difference, as the check is done in the wrong pla...
1
asmlinkage long sys_setrlimit(unsigned int resource, struct rlimit __user *rlim) { struct rlimit new_rlim, *old_rlim; unsigned long it_prof_secs; int retval; if (resource >= RLIM_NLIMITS) return -EINVAL; if (copy_from_user(&new_rlim, rlim, sizeof(*rlim))) return -EFAULT; if (new_rlim.rlim_cur > new_rlim.rlim...
308291960942000103777374680863829169927
None
CWE-20
CVE-2008-1294
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
https://nvd.nist.gov/vuln/detail/CVE-2008-1294
487,618
linux-2.6
9926e4c74300c4b31dee007298c6475d33369df0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0
CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix As discovered here today, the change in Kernel 2.6.17 intended to inhibit users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by "cheating" and setting it to 1 in such a case, does not make a difference, as the check is done in the wrong pla...
0
asmlinkage long sys_setrlimit(unsigned int resource, struct rlimit __user *rlim) { struct rlimit new_rlim, *old_rlim; unsigned long it_prof_secs; int retval; if (resource >= RLIM_NLIMITS) return -EINVAL; if (copy_from_user(&new_rlim, rlim, sizeof(*rlim))) return -EFAULT; if (new_rlim.rlim_cur > new_rlim.rlim...
187909105803248299994402329971280049548
None
CWE-20
CVE-2008-1294
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
https://nvd.nist.gov/vuln/detail/CVE-2008-1294
215,948
nettle
c71d2c9d20eeebb985e3872e4550137209e3ce4d
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d
Fixed miscomputation bugs in secp-256r1 modulo functions.
1
ecc_256_modp (const struct ecc_modulo *p, mp_limb_t *rp) { mp_limb_t u1, u0; mp_size_t n; n = 2*p->size; u1 = rp[--n]; u0 = rp[n-1]; /* This is not particularly fast, but should work well with assembly implementation. */ for (; n >= p->size; n--) { mp_limb_t q2, q1, q0, t, cy; /* <q2, q...
238786089108920286298904536145396627402
None
CWE-310
CVE-2015-8803
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
https://nvd.nist.gov/vuln/detail/CVE-2015-8803
498,160
nettle
c71d2c9d20eeebb985e3872e4550137209e3ce4d
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d
Fixed miscomputation bugs in secp-256r1 modulo functions.
0
ecc_256_modp (const struct ecc_modulo *p, mp_limb_t *rp) { mp_limb_t u1, u0; mp_size_t n; n = 2*p->size; u1 = rp[--n]; u0 = rp[n-1]; /* This is not particularly fast, but should work well with assembly implementation. */ for (; n >= p->size; n--) { mp_limb_t q2, q1, q0, t, cy; /* <q2, q...
9762716495291847327179594432373951677
None
CWE-310
CVE-2015-8803
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
https://nvd.nist.gov/vuln/detail/CVE-2015-8803
216,027
tar
cb07844454d8cc9fb21f53ace75975f91185a120
http://git.savannah.gnu.org/cgit/tar
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
Fix possible NULL dereference (savannah bug #55369) * src/sparse.c (pax_decode_header): Check return from find_next_block.
1
pax_decode_header (struct tar_sparse_file *file) { if (file->stat_info->sparse_major > 0) { uintmax_t u; char nbuf[UINTMAX_STRSIZE_BOUND]; union block *blk; char *p; size_t i; off_t start; #define COPY_BUF(b,buf,src) do \ { ...
160355660991121839913024673798590735910
None
CWE-476
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
498,918
tar
cb07844454d8cc9fb21f53ace75975f91185a120
http://git.savannah.gnu.org/cgit/tar
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
Fix possible NULL dereference (savannah bug #55369) * src/sparse.c (pax_decode_header): Check return from find_next_block.
0
pax_decode_header (struct tar_sparse_file *file) { if (file->stat_info->sparse_major > 0) { uintmax_t u; char nbuf[UINTMAX_STRSIZE_BOUND]; union block *blk; char *p; size_t i; off_t start; #define COPY_BUF(b,buf,src) do \ { ...
43484957058485536945482588311169940116
None
CWE-476
CVE-2019-9923
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
216,126
openssl
cca1cd9a3447dd067503e4a85ebd1679ee78a48e
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/cca1cd9a3447dd067503e4a85ebd1679ee78a48e
Submitted by: Tomas Hoger <thoger@redhat.com> Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
1
kssl_keytab_is_available(KSSL_CTX *kssl_ctx) { krb5_context krb5context = NULL; krb5_keytab krb5keytab = NULL; krb5_keytab_entry entry; krb5_principal princ = NULL; krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC; int rc = 0; if ((krb5rc = krb5_init_context(&kr...
99893605133546740733833372677927547347
None
CWE-20
CVE-2010-0433
The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiati...
https://nvd.nist.gov/vuln/detail/CVE-2010-0433
500,044
openssl
cca1cd9a3447dd067503e4a85ebd1679ee78a48e
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/cca1cd9a3447dd067503e4a85ebd1679ee78a48e
Submitted by: Tomas Hoger <thoger@redhat.com> Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
0
kssl_keytab_is_available(KSSL_CTX *kssl_ctx) { krb5_context krb5context = NULL; krb5_keytab krb5keytab = NULL; krb5_keytab_entry entry; krb5_principal princ = NULL; krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC; int rc = 0; if ((krb5rc = krb5_init_context(&kr...
53603406923488065201694869344560864035
None
CWE-20
CVE-2010-0433
The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiati...
https://nvd.nist.gov/vuln/detail/CVE-2010-0433
216,515
openssl
939b4960276b040fc0ed52232238fcc9e2e9ec21
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/939b4960276b040fc0ed52232238fcc9e2e9ec21
Fix race condition in NewSessionTicket If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data. CVE-2015-1791 This also fixes RT#3808 where a session ID is changed for a session alr...
1
int ssl3_get_new_session_ticket(SSL *s) { int ok, al, ret = 0, ticklen; long n; const unsigned char *p; unsigned char *d; n = s->method->ssl_get_message(s, SSL3_ST_CR_SESSION_TICKET_A, SSL3_ST_CR_SESSION_TICKET_B, ...
262201276305976211218627982974228415604
None
CWE-362
CVE-2015-1791
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe...
https://nvd.nist.gov/vuln/detail/CVE-2015-1791
502,735
openssl
939b4960276b040fc0ed52232238fcc9e2e9ec21
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/939b4960276b040fc0ed52232238fcc9e2e9ec21
Fix race condition in NewSessionTicket If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data. CVE-2015-1791 This also fixes RT#3808 where a session ID is changed for a session alr...
0
int ssl3_get_new_session_ticket(SSL *s) { int ok, al, ret = 0, ticklen; long n; const unsigned char *p; unsigned char *d; n = s->method->ssl_get_message(s, SSL3_ST_CR_SESSION_TICKET_A, SSL3_ST_CR_SESSION_TICKET_B, ...
24541052959849141799219681889549728285
None
CWE-362
CVE-2015-1791
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe...
https://nvd.nist.gov/vuln/detail/CVE-2015-1791
216,637
guile
245608911698adb3472803856019bdd5670b6614
http://git.savannah.gnu.org/cgit/guile
http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=245608911698adb3472803856019bdd5670b6614
Remove 'umask' calls from 'mkdir'. Fixes <http://bugs.gnu.org/24659>. * libguile/filesys.c (SCM_DEFINE): Remove calls to 'umask' when MODE is unbound; instead, use 0777 as the mode. Update docstring to clarify this. * doc/ref/posix.texi (File System): Adjust accordingly. * NEWS: Mention it.
1
SCM_DEFINE (scm_mkdir, "mkdir", 1, 1, 0, (SCM path, SCM mode), "Create a new directory named by @var{path}. If @var{mode} is omitted\n" "then the permissions of the directory file are set using the current\n" "umask. Otherwise they are set to the decimal value specified with\n" "@var{m...
128331080543585624737822334688372409592
None
CWE-275
CVE-2016-8605
The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2....
https://nvd.nist.gov/vuln/detail/CVE-2016-8605
503,867
guile
245608911698adb3472803856019bdd5670b6614
http://git.savannah.gnu.org/cgit/guile
http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=245608911698adb3472803856019bdd5670b6614
Remove 'umask' calls from 'mkdir'. Fixes <http://bugs.gnu.org/24659>. * libguile/filesys.c (SCM_DEFINE): Remove calls to 'umask' when MODE is unbound; instead, use 0777 as the mode. Update docstring to clarify this. * doc/ref/posix.texi (File System): Adjust accordingly. * NEWS: Mention it.
0
SCM_DEFINE (scm_mkdir, "mkdir", 1, 1, 0, (SCM path, SCM mode), "Create a new directory named by @var{path}. If @var{mode} is omitted\n" "then the permissions of the directory are set to @code{#o777}\n" "masked with the current umask (@pxref{Processes, @code{umask}}).\n" "Otherwise they ...
144536922752412825349714870039112918366
None
CWE-275
CVE-2016-8605
The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2....
https://nvd.nist.gov/vuln/detail/CVE-2016-8605
216,654
core
2c3f37672277b1f73f84722802aaa0ab1ab3e413
https://github.com/LibreOffice/core
https://github.com/dovecot/core/commit/2c3f37672277b1f73f84722802aaa0ab1ab3e413
auth: Don't crash expanding %variables when username isn't set. This continues the auth-policy fix in c3d3faa4f72a676e183f34be960cff13a5a725ae
1
auth_request_get_var_expand_table_full(const struct auth_request *auth_request, auth_request_escape_func_t *escape_func, unsigned int *count) { const unsigned int auth_count = N_ELEMENTS(auth_request_var_expand_static_tab); struct var_expand_table *tab, *ret_tab; const char *orig_user, *auth_...
262295488878616392807601246569405637828
None
CWE-20
CVE-2016-8652
The auth component in Dovecot before 2.2.27, when auth-policy is configured, allows a remote attackers to cause a denial of service (crash) by aborting authentication without setting a username.
https://nvd.nist.gov/vuln/detail/CVE-2016-8652
503,985
core
2c3f37672277b1f73f84722802aaa0ab1ab3e413
https://github.com/LibreOffice/core
https://github.com/dovecot/core/commit/2c3f37672277b1f73f84722802aaa0ab1ab3e413
auth: Don't crash expanding %variables when username isn't set. This continues the auth-policy fix in c3d3faa4f72a676e183f34be960cff13a5a725ae
0
auth_request_get_var_expand_table_full(const struct auth_request *auth_request, auth_request_escape_func_t *escape_func, unsigned int *count) { const unsigned int auth_count = N_ELEMENTS(auth_request_var_expand_static_tab); struct var_expand_table *tab, *ret_tab; const char *orig_user, *auth_...
300800458657154811271321575901169213921
None
CWE-20
CVE-2016-8652
The auth component in Dovecot before 2.2.27, when auth-policy is configured, allows a remote attackers to cause a denial of service (crash) by aborting authentication without setting a username.
https://nvd.nist.gov/vuln/detail/CVE-2016-8652
216,701
libtiff
dc02f9050311a90b3c0655147cee09bfa7081cfc
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/dc02f9050311a90b3c0655147cee09bfa7081cfc
* libtiff/tif_read.c: add protection against excessive memory allocation attempts in TIFFReadDirEntryArray() on short files. Effective for mmap'ed case. And non-mmap'ed case, but restricted to 64bit builds. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2675
1
static enum TIFFReadDirEntryErr TIFFReadDirEntryArrayWithLimit( TIFF* tif, TIFFDirEntry* direntry, uint32* count, uint32 desttypesize, void** value, uint64 maxcount) { int typesize; uint32 datasize; void* data; uint64 target_count64; typesize=TIFFDataWidth(direntry->tdir_type); target_count...
251386727160240066128978497337284996796
None
CWE-770
CVE-2017-12944
The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation.
https://nvd.nist.gov/vuln/detail/CVE-2017-12944
504,608
libtiff
dc02f9050311a90b3c0655147cee09bfa7081cfc
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/dc02f9050311a90b3c0655147cee09bfa7081cfc
* libtiff/tif_read.c: add protection against excessive memory allocation attempts in TIFFReadDirEntryArray() on short files. Effective for mmap'ed case. And non-mmap'ed case, but restricted to 64bit builds. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2675
0
static enum TIFFReadDirEntryErr TIFFReadDirEntryArrayWithLimit( TIFF* tif, TIFFDirEntry* direntry, uint32* count, uint32 desttypesize, void** value, uint64 maxcount) { int typesize; uint32 datasize; void* data; uint64 target_count64; typesize=TIFFDataWidth(direntry->tdir_type); target_count...
283163990857495325814682097643200308064
None
CWE-770
CVE-2017-12944
The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation.
https://nvd.nist.gov/vuln/detail/CVE-2017-12944
216,726
openssl
f426625b6ae9a7831010750490a5f0ad689c5ba3
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f426625b6ae9a7831010750490a5f0ad689c5ba3
Prevent over long nonces in ChaCha20-Poly1305 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than...
1
static int chacha20_poly1305_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { EVP_CHACHA_AEAD_CTX *actx = aead_data(ctx); switch(type) { case EVP_CTRL_INIT: if (actx == NULL) actx = ctx->cipher_data = OPENSSL_zalloc(sizeof(*act...
82290393614199201513765816848927157706
None
CWE-327
CVE-2019-1543
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a...
https://nvd.nist.gov/vuln/detail/CVE-2019-1543
505,463
openssl
f426625b6ae9a7831010750490a5f0ad689c5ba3
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f426625b6ae9a7831010750490a5f0ad689c5ba3
Prevent over long nonces in ChaCha20-Poly1305 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than...
0
static int chacha20_poly1305_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { EVP_CHACHA_AEAD_CTX *actx = aead_data(ctx); switch(type) { case EVP_CTRL_INIT: if (actx == NULL) actx = ctx->cipher_data = OPENSSL_zalloc(sizeof(*act...
319328437340198657902119470811531700376
None
CWE-327
CVE-2019-1543
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a...
https://nvd.nist.gov/vuln/detail/CVE-2019-1543
216,800
core
69ad3c902ea4bbf9f21ab1857d8923f975dc6145
https://github.com/LibreOffice/core
https://github.com/dovecot/core/commit/69ad3c902ea4bbf9f21ab1857d8923f975dc6145
auth: mech-rpa - Fail on zero len buffer
1
rpa_read_buffer(pool_t pool, const unsigned char **data, const unsigned char *end, unsigned char **buffer) { const unsigned char *p = *data; unsigned int len; if (p > end) return 0; len = *p++; if (p + len > end) return 0; *buffer = p_malloc(pool, len); memcpy(*buffer, p, len); *data += 1 + len; ret...
29472874834578262075169131407750507339
None
CWE-125
CVE-2020-12674
In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2020-12674
506,428
core
69ad3c902ea4bbf9f21ab1857d8923f975dc6145
https://github.com/LibreOffice/core
https://github.com/dovecot/core/commit/69ad3c902ea4bbf9f21ab1857d8923f975dc6145
auth: mech-rpa - Fail on zero len buffer
0
rpa_read_buffer(pool_t pool, const unsigned char **data, const unsigned char *end, unsigned char **buffer) { const unsigned char *p = *data; unsigned int len; if (p > end) return 0; len = *p++; if (p + len > end || len == 0) return 0; *buffer = p_malloc(pool, len); memcpy(*buffer, p, len); *data += 1 ...
42033596058129329438262094419912462932
None
CWE-125
CVE-2020-12674
In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2020-12674
216,861
openssl
94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/94d23fcff9b2a7a8368dfe52214d5c2569882c11
Fix EC_GROUP_new_from_ecparameters to check the base length Check that there's at least one byte in params->base before trying to read it. CVE-2021-3712 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
1
EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params) { int ok = 0, tmp; EC_GROUP *ret = NULL, *dup = NULL; BIGNUM *p = NULL, *a = NULL, *b = NULL; EC_POINT *point = NULL; long field_bits; int curve_name = NID_undef; BN_CTX *ctx = NULL; if (!params->fieldID || !params->fi...
80540639516178112864890741931948685257
None
CWE-125
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str...
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
507,778
openssl
94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/94d23fcff9b2a7a8368dfe52214d5c2569882c11
Fix EC_GROUP_new_from_ecparameters to check the base length Check that there's at least one byte in params->base before trying to read it. CVE-2021-3712 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
0
EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params) { int ok = 0, tmp; EC_GROUP *ret = NULL, *dup = NULL; BIGNUM *p = NULL, *a = NULL, *b = NULL; EC_POINT *point = NULL; long field_bits; int curve_name = NID_undef; BN_CTX *ctx = NULL; if (!params->fieldID || !params->fi...
230738893451780669362858497865794698672
None
CWE-125
CVE-2021-3712
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str...
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
216,903
server
3a52569499e2f0c4d1f25db1e81617a9d9755400
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/3a52569499e2f0c4d1f25db1e81617a9d9755400
MDEV-25636: Bug report: abortion in sql/sql_parse.cc:6294 The asserion failure was caused by this query select /*id=1*/ from t1 where col= ( select /*id=2*/ from ... where corr_cond1 union select /*id=4*/ from ... where corr_cond2) Here, - select with id=2 was correlated due to corr_cond1....
1
bool st_select_lex::optimize_unflattened_subqueries(bool const_only) { SELECT_LEX_UNIT *next_unit= NULL; for (SELECT_LEX_UNIT *un= first_inner_unit(); un; un= next_unit ? next_unit : un->next_unit()) { Item_subselect *subquery_predicate= un->item; next_unit= NULL; if (subquery_predicate...
170977446789514176182113064369700449502
None
CWE-476
CVE-2021-46664
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
https://nvd.nist.gov/vuln/detail/CVE-2021-46664
508,874
server
3a52569499e2f0c4d1f25db1e81617a9d9755400
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/3a52569499e2f0c4d1f25db1e81617a9d9755400
MDEV-25636: Bug report: abortion in sql/sql_parse.cc:6294 The asserion failure was caused by this query select /*id=1*/ from t1 where col= ( select /*id=2*/ from ... where corr_cond1 union select /*id=4*/ from ... where corr_cond2) Here, - select with id=2 was correlated due to corr_cond1....
0
bool st_select_lex::optimize_unflattened_subqueries(bool const_only) { SELECT_LEX_UNIT *next_unit= NULL; for (SELECT_LEX_UNIT *un= first_inner_unit(); un; un= next_unit ? next_unit : un->next_unit()) { Item_subselect *subquery_predicate= un->item; next_unit= NULL; if (subquery_predicate...
335655854636733648424487878771712666992
None
CWE-476
CVE-2021-46664
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
https://nvd.nist.gov/vuln/detail/CVE-2021-46664
216,945
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/807945f2eb5fa22e6f233cc17b85a2e141efe2c8
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
1
bool Item_equal::create_pushable_equalities(THD *thd, List<Item> *equalities, Pushdown_checker checker, uchar *arg, bool clone_const) { Item *...
310506936609045112273577090786370872524
None
CWE-617
CVE-2022-27382
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.
https://nvd.nist.gov/vuln/detail/CVE-2022-27382
512,825
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/807945f2eb5fa22e6f233cc17b85a2e141efe2c8
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
0
bool Item_equal::create_pushable_equalities(THD *thd, List<Item> *equalities, Pushdown_checker checker, uchar *arg, bool clone_const) { Item *...
247600252359942672774915786547473250797
None
CWE-617
CVE-2022-27382
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.
https://nvd.nist.gov/vuln/detail/CVE-2022-27382
216,946
server
c05fd700970ad45735caed3a6f9930d4ce19a3bd
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/c05fd700970ad45735caed3a6f9930d4ce19a3bd
MDEV-26323 use-after-poison issue of MariaDB server
1
static void fix_dl_name(MEM_ROOT *root, LEX_STRING *dl) { const size_t so_ext_len= sizeof(SO_EXT) - 1; if (my_strcasecmp(&my_charset_latin1, dl->str + dl->length - so_ext_len, SO_EXT)) { char *s= (char*)alloc_root(root, dl->length + so_ext_len + 1); memcpy(s, dl->str, dl->length); ...
339917125862392009139749816960654857347
None
CWE-416
CVE-2022-27383
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
https://nvd.nist.gov/vuln/detail/CVE-2022-27383
513,202
server
c05fd700970ad45735caed3a6f9930d4ce19a3bd
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/c05fd700970ad45735caed3a6f9930d4ce19a3bd
MDEV-26323 use-after-poison issue of MariaDB server
0
static void fix_dl_name(MEM_ROOT *root, LEX_STRING *dl) { const size_t so_ext_len= sizeof(SO_EXT) - 1; if (dl->length < so_ext_len || my_strcasecmp(&my_charset_latin1, dl->str + dl->length - so_ext_len, SO_EXT)) { char *s= (char*)alloc_root(root, dl->length + so_ext_len + 1); mem...
98463444639733543200591125506342217809
None
CWE-416
CVE-2022-27383
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
https://nvd.nist.gov/vuln/detail/CVE-2022-27383
216,965
server
ecb6f9c894d3ebafeff1c6eb3b65cd248062296f
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/ecb6f9c894d3ebafeff1c6eb3b65cd248062296f
MDEV-28095 crash in multi-update and implicit grouping disallow implicit grouping in multi-update. explicit GROUP BY is not allowed by the grammar.
1
multi_update::initialize_tables(JOIN *join) { TABLE_LIST *table_ref; DBUG_ENTER("initialize_tables"); if (unlikely((thd->variables.option_bits & OPTION_SAFE_UPDATES) && error_if_full_join(join))) DBUG_RETURN(1); main_table=join->join_tab->table; table_to_update= 0; /* Any update has at ...
133589877756276645137859301197732446596
None
CWE-617
CVE-2022-27448
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
https://nvd.nist.gov/vuln/detail/CVE-2022-27448
514,292
server
ecb6f9c894d3ebafeff1c6eb3b65cd248062296f
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/ecb6f9c894d3ebafeff1c6eb3b65cd248062296f
MDEV-28095 crash in multi-update and implicit grouping disallow implicit grouping in multi-update. explicit GROUP BY is not allowed by the grammar.
0
multi_update::initialize_tables(JOIN *join) { TABLE_LIST *table_ref; DBUG_ENTER("initialize_tables"); if (unlikely((thd->variables.option_bits & OPTION_SAFE_UPDATES) && error_if_full_join(join))) DBUG_RETURN(1); if (join->implicit_grouping) { my_error(ER_INVALID_GROUP_FUNC_USE, MYF(0))...
64239982738333152415398593981285799300
None
CWE-617
CVE-2022-27448
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
https://nvd.nist.gov/vuln/detail/CVE-2022-27448
217,176
monit
328f60773057641c4b2075fab9820145e95b728c
https://bitbucket.org/tildeslash/monit
https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c
Fixed: HTML escape the log file content when viewed via Monit GUI.
1
static void do_viewlog(HttpRequest req, HttpResponse res) { if (is_readonly(req)) { send_error(req, res, SC_FORBIDDEN, "You do not have sufficient privileges to access this page"); return; } do_head(res, "_viewlog", "View log", 100); if ((Run.flags & Run_L...
11066915327345888296428446172682700897
None
CWE-79
CVE-2019-11454
Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
https://nvd.nist.gov/vuln/detail/CVE-2019-11454
517,437
monit
328f60773057641c4b2075fab9820145e95b728c
https://bitbucket.org/tildeslash/monit
https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c
Fixed: HTML escape the log file content when viewed via Monit GUI.
0
static void do_viewlog(HttpRequest req, HttpResponse res) { if (is_readonly(req)) { send_error(req, res, SC_FORBIDDEN, "You do not have sufficient privileges to access this page"); return; } do_head(res, "_viewlog", "View log", 100); if ((Run.flags & Run_L...
289779635859944473579386698211739203129
None
CWE-79
CVE-2019-11454
Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
https://nvd.nist.gov/vuln/detail/CVE-2019-11454
217,551
elfspirit
c5b0f5a9a24f2451bbeda4751d67633bc375e608
https://github.com/liyansong2018/elfspirit
https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608
Fix #1 about out-of-bounds
1
int parse(char *elf) { int fd; struct stat st; uint8_t *elf_map; int count; char *tmp; char *name; char flag[4]; MODE = get_elf_class(elf); fd = open(elf, O_RDONLY); if (fd < 0) { perror("open"); return -1; } if (fstat(fd, &st) < 0) { perror("fs...
10492118832219739041814229234332696880
None
CWE-125
CVE-2022-21711
elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the i...
https://nvd.nist.gov/vuln/detail/CVE-2022-21711
522,438
elfspirit
c5b0f5a9a24f2451bbeda4751d67633bc375e608
https://github.com/liyansong2018/elfspirit
https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608
Fix #1 about out-of-bounds
0
int parse(char *elf) { int fd; struct stat st; uint8_t *elf_map; int count; char *tmp; char *name; char flag[4]; MODE = get_elf_class(elf); fd = open(elf, O_RDONLY); if (fd < 0) { perror("open"); return -1; } if (fstat(fd, &st) < 0) { perror("fs...
212625338852409612714470845997465821390
None
CWE-125
CVE-2022-21711
elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the i...
https://nvd.nist.gov/vuln/detail/CVE-2022-21711