idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash string | file_name string | file_hash string | cwe string | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
211,181 | php-src | a72cd07f2983dc43a6bb35209dc4687852e53c09 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=a72cd07f2983dc43a6bb35209dc4687852e53c09 | Fixed bug #68665 (Invalid free) | 1 | apprentice_load(struct magic_set *ms, const char *fn, int action)
{
int errs = 0;
uint32_t i, j;
size_t files = 0, maxfiles = 0;
char **filearr = NULL;
struct stat st;
struct magic_map *map;
struct magic_entry_set mset[MAGIC_SETS];
php_stream *dir;
php_stream_dirent d;
TSRMLS_FETCH();
memset(mset, 0, size... | 215852170840415887446784967790257485070 | apprentice.c | 136822894511518552455761565191570256868 | CWE-17 | CVE-2014-9426 | The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via un... | https://nvd.nist.gov/vuln/detail/CVE-2014-9426 |
447,231 | php-src | a72cd07f2983dc43a6bb35209dc4687852e53c09 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=a72cd07f2983dc43a6bb35209dc4687852e53c09 | Fixed bug #68665 (Invalid free) | 0 | apprentice_load(struct magic_set *ms, const char *fn, int action)
{
int errs = 0;
uint32_t i, j;
size_t files = 0, maxfiles = 0;
char **filearr = NULL;
struct stat st;
struct magic_map *map;
struct magic_entry_set mset[MAGIC_SETS];
php_stream *dir;
php_stream_dirent d;
TSRMLS_FETCH();
memset(mset, 0, size... | 156454401926797998343757810189411499663 | apprentice.c | 133128407981065524680771127461274572868 | CWE-17 | CVE-2014-9426 | The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via un... | https://nvd.nist.gov/vuln/detail/CVE-2014-9426 |
211,473 | gdk-pixbuf | 4f0f465f991cd454d03189497f923eb40c170c22 | http://git.gnome.org/browse/gdk-pixbuf | http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22 | Avoid an integer overflow in the xbm loader
At the same time, reject some silly input, such as negative
width or height.
https://bugzilla.gnome.org/show_bug.cgi?id=672811 | 1 | read_bitmap_file_data (FILE *fstream,
guint *width,
guint *height,
guchar **data,
int *x_hot,
int *y_hot)
{
guchar *bits = NULL; /* working variable */
char line[MAX_SIZE]; /* input line from file */
int size; /* number of bytes of data */
char name_... | 243317071642584588963963288402776213734 | io-xbm.c | 331454281510719411806234723168878735596 | CWE-189 | CVE-2012-2370 | Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-2370 |
448,584 | gdk-pixbuf | 4f0f465f991cd454d03189497f923eb40c170c22 | http://git.gnome.org/browse/gdk-pixbuf | http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22 | Avoid an integer overflow in the xbm loader
At the same time, reject some silly input, such as negative
width or height.
https://bugzilla.gnome.org/show_bug.cgi?id=672811 | 0 | read_bitmap_file_data (FILE *fstream,
guint *width,
guint *height,
guchar **data,
int *x_hot,
int *y_hot)
{
guchar *bits = NULL; /* working variable */
char line[MAX_SIZE]; /* input line from file */
int size; /* number of bytes of data */
char name_... | 77339480051751804955061545708983319434 | io-xbm.c | 72320400164573844701740100175045869458 | CWE-189 | CVE-2012-2370 | Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-2370 |
211,506 | zlib | eff308af425b67093bab25f80f1ae950166bece1 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1 | Fix a bug when getting a gzip header extra field with inflate().
If the extra field was larger than the space the user provided with
inflateGetHeader(), and if multiple calls of inflate() delivered
the extra header data, then there could be a buffer overflow of the
provided space. This commit assures that provided spa... | 1 | int ZEXPORT inflate(strm, flush)
z_streamp strm;
int flush;
{
struct inflate_state FAR *state;
z_const unsigned char FAR *next; /* next input */
unsigned char FAR *put; /* next output */
unsigned have, left; /* available input and output */
unsigned long hold; /* bit buffer */
... | 308042126203552622330885717948323954753 | inflate.c | 13307216410875362203864420162564887753 | CWE-787 | CVE-2022-37434 | zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the n... | https://nvd.nist.gov/vuln/detail/CVE-2022-37434 |
448,912 | zlib | eff308af425b67093bab25f80f1ae950166bece1 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1 | Fix a bug when getting a gzip header extra field with inflate().
If the extra field was larger than the space the user provided with
inflateGetHeader(), and if multiple calls of inflate() delivered
the extra header data, then there could be a buffer overflow of the
provided space. This commit assures that provided spa... | 0 | int ZEXPORT inflate(strm, flush)
z_streamp strm;
int flush;
{
struct inflate_state FAR *state;
z_const unsigned char FAR *next; /* next input */
unsigned char FAR *put; /* next output */
unsigned have, left; /* available input and output */
unsigned long hold; /* bit buffer */
... | 77680460964707773234667939079956613143 | inflate.c | 53439547439920310595361050781327807541 | CWE-787 | CVE-2022-37434 | zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the n... | https://nvd.nist.gov/vuln/detail/CVE-2022-37434 |
211,563 | vim | a062006b9de0b2947ab5fb376c6e67ef92a8cd69 | https://github.com/vim/vim | https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 | patch 8.2.3610: crash when ModeChanged triggered too early
Problem: Crash when ModeChanged triggered too early.
Solution: Trigger ModeChanged after setting VIsual. | 1 | n_start_visual_mode(int c)
{
#ifdef FEAT_CONCEAL
int cursor_line_was_concealed = curwin->w_p_cole > 0
&& conceal_cursor_line(curwin);
#endif
VIsual_mode = c;
VIsual_active = TRUE;
VIsual_reselect = TRUE;
trigger_modechanged();
// Corner case: the 0 position in a tab may change when going... | 184740522957607059139984101996502665794 | None | CWE-122 | CVE-2021-3968 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2021-3968 | |
449,294 | vim | a062006b9de0b2947ab5fb376c6e67ef92a8cd69 | https://github.com/vim/vim | https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 | patch 8.2.3610: crash when ModeChanged triggered too early
Problem: Crash when ModeChanged triggered too early.
Solution: Trigger ModeChanged after setting VIsual. | 0 | n_start_visual_mode(int c)
{
#ifdef FEAT_CONCEAL
int cursor_line_was_concealed = curwin->w_p_cole > 0
&& conceal_cursor_line(curwin);
#endif
VIsual_mode = c;
VIsual_active = TRUE;
VIsual_reselect = TRUE;
// Corner case: the 0 position in a tab may change when going into
// virtualedit. ... | 18013964164383096631914378209665418022 | None | CWE-122 | CVE-2021-3968 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2021-3968 | |
211,695 | vim | 4c13e5e6763c6eb36a343a2b8235ea227202e952 | https://github.com/vim/vim | https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952 | patch 8.2.3949: using freed memory with /\%V
Problem: Using freed memory with /\%V.
Solution: Get the line again after getvvcol(). | 1 | reg_match_visual(void)
{
pos_T top, bot;
linenr_T lnum;
colnr_T col;
win_T *wp = rex.reg_win == NULL ? curwin : rex.reg_win;
int mode;
colnr_T start, end;
colnr_T start2, end2;
colnr_T cols;
colnr_T curswant;
// Check if the buffer is the current buffer.
if (rex.reg_buf ... | 213127434587581742033304075177767787021 | regexp.c | 154178765544405999260732501141990227321 | CWE-416 | CVE-2021-4192 | vim is vulnerable to Use After Free | https://nvd.nist.gov/vuln/detail/CVE-2021-4192 |
450,764 | vim | 4c13e5e6763c6eb36a343a2b8235ea227202e952 | https://github.com/vim/vim | https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952 | patch 8.2.3949: using freed memory with /\%V
Problem: Using freed memory with /\%V.
Solution: Get the line again after getvvcol(). | 0 | reg_match_visual(void)
{
pos_T top, bot;
linenr_T lnum;
colnr_T col;
win_T *wp = rex.reg_win == NULL ? curwin : rex.reg_win;
int mode;
colnr_T start, end;
colnr_T start2, end2;
colnr_T cols;
colnr_T curswant;
// Check if the buffer is the current buffer.
if (rex.reg_buf ... | 273404837920170490390239404652231965596 | regexp.c | 323022444375597496724509829879656182542 | CWE-416 | CVE-2021-4192 | vim is vulnerable to Use After Free | https://nvd.nist.gov/vuln/detail/CVE-2021-4192 |
211,700 | linux | 4fbcc1a4cb20fe26ad0225679c536c80f1648221 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221 | nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
It appears that there are some buffer overflows in EVT_TRANSACTION.
This happens because the length parameters that are passed to memcpy
come directly from skb->data and are not guarded in any way.
Signed-off-by: Jordy Zomer <jordy@pwning.systems>
Revie... | 1 | int st21nfca_connectivity_event_received(struct nfc_hci_dev *hdev, u8 host,
u8 event, struct sk_buff *skb)
{
int r = 0;
struct device *dev = &hdev->ndev->dev;
struct nfc_evt_transaction *transaction;
pr_debug("connectivity gate event: %x\n", event);
switch (event) {
case ST21NFCA_EVT_CONNECTIVITY:
r = nfc... | 253634808738614127513017365541725702270 | se.c | 262088554020527485810277505080130104803 | CWE-120 | CVE-2022-26490 | st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters. | https://nvd.nist.gov/vuln/detail/CVE-2022-26490 |
450,830 | linux | 4fbcc1a4cb20fe26ad0225679c536c80f1648221 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221 | nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION
It appears that there are some buffer overflows in EVT_TRANSACTION.
This happens because the length parameters that are passed to memcpy
come directly from skb->data and are not guarded in any way.
Signed-off-by: Jordy Zomer <jordy@pwning.systems>
Revie... | 0 | int st21nfca_connectivity_event_received(struct nfc_hci_dev *hdev, u8 host,
u8 event, struct sk_buff *skb)
{
int r = 0;
struct device *dev = &hdev->ndev->dev;
struct nfc_evt_transaction *transaction;
pr_debug("connectivity gate event: %x\n", event);
switch (event) {
case ST21NFCA_EVT_CONNECTIVITY:
r = nfc... | 192395528803862067074725666985010866676 | se.c | 50941829261793889476158524684428564511 | CWE-120 | CVE-2022-26490 | st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters. | https://nvd.nist.gov/vuln/detail/CVE-2022-26490 |
211,842 | vim | 4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa | https://github.com/vim/vim | https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa | patch 8.2.4436: crash with weird 'vartabstop' value
Problem: Crash with weird 'vartabstop' value.
Solution: Check for running into the end of the line. | 1 | change_indent(
int type,
int amount,
int round,
int replaced, // replaced character, put on replace stack
int call_changed_bytes) // call changed_bytes()
{
int vcol;
int last_vcol;
int insstart_less; // reduction for Insstart.col
int new_cursor_col;
int i;
char_u *... | 104434622616430304167109103842435027722 | indent.c | 225104819640164774379021828754456921804 | CWE-787 | CVE-2022-0714 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436. | https://nvd.nist.gov/vuln/detail/CVE-2022-0714 |
452,377 | vim | 4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa | https://github.com/vim/vim | https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa | patch 8.2.4436: crash with weird 'vartabstop' value
Problem: Crash with weird 'vartabstop' value.
Solution: Check for running into the end of the line. | 0 | change_indent(
int type,
int amount,
int round,
int replaced, // replaced character, put on replace stack
int call_changed_bytes) // call changed_bytes()
{
int vcol;
int last_vcol;
int insstart_less; // reduction for Insstart.col
int new_cursor_col;
int i;
char_u *... | 281315459122812097070130024816280546627 | indent.c | 175343284041603087029849272826009468440 | CWE-787 | CVE-2022-0714 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436. | https://nvd.nist.gov/vuln/detail/CVE-2022-0714 |
211,868 | nf | b1a5983f56e371046dcf164f90bfaf704d2b89f6 | http://git.kernel.org/cgit/linux/kernel/git/pablo/nf | https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6 | netfilter: nf_tables_offload: incorrect flow offload action array size
immediate verdict expression needs to allocate one slot in the flow offload
action array, however, immediate data expression does not need to do so.
fwd and dup expression need to allocate one slot, this is missing.
Add a new offload_action inter... | 1 | struct nft_flow_rule *nft_flow_rule_create(struct net *net,
const struct nft_rule *rule)
{
struct nft_offload_ctx *ctx;
struct nft_flow_rule *flow;
int num_actions = 0, err;
struct nft_expr *expr;
expr = nft_expr_first(rule);
while (nft_expr_more(rule, expr)) {
if (expr->ops->offload_flags & NFT_OFFLOA... | 135282973834013788624737629823587242676 | nf_tables_offload.c | 26603376215652964964004794041493892983 | CWE-269 | CVE-2022-25636 | net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload. | https://nvd.nist.gov/vuln/detail/CVE-2022-25636 |
452,994 | nf | b1a5983f56e371046dcf164f90bfaf704d2b89f6 | http://git.kernel.org/cgit/linux/kernel/git/pablo/nf | https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6 | netfilter: nf_tables_offload: incorrect flow offload action array size
immediate verdict expression needs to allocate one slot in the flow offload
action array, however, immediate data expression does not need to do so.
fwd and dup expression need to allocate one slot, this is missing.
Add a new offload_action inter... | 0 | struct nft_flow_rule *nft_flow_rule_create(struct net *net,
const struct nft_rule *rule)
{
struct nft_offload_ctx *ctx;
struct nft_flow_rule *flow;
int num_actions = 0, err;
struct nft_expr *expr;
expr = nft_expr_first(rule);
while (nft_expr_more(rule, expr)) {
if (expr->ops->offload_action &&
ex... | 59444629723641299753508256533223671386 | nf_tables_offload.c | 69217204877048087601961561157864546689 | CWE-269 | CVE-2022-25636 | net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload. | https://nvd.nist.gov/vuln/detail/CVE-2022-25636 |
211,877 | libexpat | a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 | lib: Protect against malicious namespace declarations (CVE-2022-25236) | 1 | addBinding(XML_Parser parser, PREFIX *prefix, const ATTRIBUTE_ID *attId,
const XML_Char *uri, BINDING **bindingsPtr) {
static const XML_Char xmlNamespace[]
= {ASCII_h, ASCII_t, ASCII_t, ASCII_p, ASCII_COLON,
ASCII_SLASH, ASCII_SLASH, ASCII_w, ASCII_w, ASCII_w,
... | 22295362737021887331084829836677682659 | xmlparse.c | 64970761866861782031621044957132437337 | CWE-668 | CVE-2022-25236 | xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs. | https://nvd.nist.gov/vuln/detail/CVE-2022-25236 |
453,109 | libexpat | a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 | lib: Protect against malicious namespace declarations (CVE-2022-25236) | 0 | addBinding(XML_Parser parser, PREFIX *prefix, const ATTRIBUTE_ID *attId,
const XML_Char *uri, BINDING **bindingsPtr) {
static const XML_Char xmlNamespace[]
= {ASCII_h, ASCII_t, ASCII_t, ASCII_p, ASCII_COLON,
ASCII_SLASH, ASCII_SLASH, ASCII_w, ASCII_w, ASCII_w,
... | 180909609780994811991308792390157424153 | xmlparse.c | 39872007825496999526918942248087494728 | CWE-668 | CVE-2022-25236 | xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs. | https://nvd.nist.gov/vuln/detail/CVE-2022-25236 |
212,407 | varnish-cache | c5fd097e5cce8b461c6443af02b3448baef2491d | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/c5fd097e5cce8b461c6443af02b3448baef2491d | Do not call http_hdr_flags() on pseudo-headers
In http_EstimateWS(), all headers are passed to the http_isfiltered()
function to calculate how many bytes is needed to serialize the entire
struct http. http_isfiltered() will check the headers for whether they are
going to be filtered out later and if so skip them.
How... | 1 | http_isfiltered(const struct http *fm, unsigned u, unsigned how)
{
const char *e;
const struct http_hdrflg *f;
if (fm->hdf[u] & HDF_FILTER)
return (1);
e = strchr(fm->hd[u].b, ':');
if (e == NULL)
return (0);
f = http_hdr_flags(fm->hd[u].b, e);
return (f != NULL && f->flag & how);
} | 811300647438513744666233377828733318 | cache_http.c | 145239057408586301398711991484884532857 | CWE-703 | CVE-2022-38150 | In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1. | https://nvd.nist.gov/vuln/detail/CVE-2022-38150 |
459,029 | varnish-cache | c5fd097e5cce8b461c6443af02b3448baef2491d | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/c5fd097e5cce8b461c6443af02b3448baef2491d | Do not call http_hdr_flags() on pseudo-headers
In http_EstimateWS(), all headers are passed to the http_isfiltered()
function to calculate how many bytes is needed to serialize the entire
struct http. http_isfiltered() will check the headers for whether they are
going to be filtered out later and if so skip them.
How... | 0 | http_isfiltered(const struct http *fm, unsigned u, unsigned how)
{
const char *e;
const struct http_hdrflg *f;
if (fm->hdf[u] & HDF_FILTER)
return (1);
if (u < HTTP_HDR_FIRST)
return (0);
e = strchr(fm->hd[u].b, ':');
if (e == NULL)
return (0);
f = http_hdr_flags(fm->hd[u].b, e);
return (f != NULL && f->... | 214500471714364858208416051205285025611 | cache_http.c | 148461925742958572930249757440638720534 | CWE-703 | CVE-2022-38150 | In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1. | https://nvd.nist.gov/vuln/detail/CVE-2022-38150 |
212,414 | linux | 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | net: sched: fix use-after-free in tc_new_tfilter()
Whenever tc_new_tfilter() jumps back to replay: label,
we need to make sure @q and @chain local variables are cleared again,
or risk use-after-free as in [1]
For consistency, apply the same fix in tc_ctl_chain()
BUG: KASAN: use-after-free in mini_qdisc_pair_swap+0x1... | 1 | static int tc_new_tfilter(struct sk_buff *skb, struct nlmsghdr *n,
struct netlink_ext_ack *extack)
{
struct net *net = sock_net(skb->sk);
struct nlattr *tca[TCA_MAX + 1];
char name[IFNAMSIZ];
struct tcmsg *t;
u32 protocol;
u32 prio;
bool prio_allocate;
u32 parent;
u32 chain_index;
struct Qdisc *q = NULL;... | 18151855959135734228627793679159459802 | cls_api.c | 251903803472854915466369605008106287178 | CWE-416 | CVE-2022-1055 | A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | https://nvd.nist.gov/vuln/detail/CVE-2022-1055 |
459,107 | linux | 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | net: sched: fix use-after-free in tc_new_tfilter()
Whenever tc_new_tfilter() jumps back to replay: label,
we need to make sure @q and @chain local variables are cleared again,
or risk use-after-free as in [1]
For consistency, apply the same fix in tc_ctl_chain()
BUG: KASAN: use-after-free in mini_qdisc_pair_swap+0x1... | 0 | static int tc_new_tfilter(struct sk_buff *skb, struct nlmsghdr *n,
struct netlink_ext_ack *extack)
{
struct net *net = sock_net(skb->sk);
struct nlattr *tca[TCA_MAX + 1];
char name[IFNAMSIZ];
struct tcmsg *t;
u32 protocol;
u32 prio;
bool prio_allocate;
u32 parent;
u32 chain_index;
struct Qdisc *q;
struc... | 249400845678093962479611801234831545975 | cls_api.c | 31293344430191637657447401884064089853 | CWE-416 | CVE-2022-1055 | A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 | https://nvd.nist.gov/vuln/detail/CVE-2022-1055 |
212,433 | vim | ccfde4d028e891a41e3548323c3d47b06fb0b83e | https://github.com/vim/vim | https://github.com/vim/vim/commit/ccfde4d028e891a41e3548323c3d47b06fb0b83e | patch 9.0.0389: crash when 'tagfunc' closes the window
Problem: Crash when 'tagfunc' closes the window.
Solution: Bail out when the window was closed. | 1 | do_tag(
char_u *tag, // tag (pattern) to jump to
int type,
int count,
int forceit, // :ta with !
int verbose) // print "tag not found" message
{
taggy_T *tagstack = curwin->w_tagstack;
int tagstackidx = curwin->w_tagstackidx;
int tagstacklen = curwin->w_tagstacklen;
int cur_m... | 163270354086098606424218695920397836600 | tag.c | 256312624888395967188545141531528405807 | CWE-416 | CVE-2022-3134 | Use After Free in GitHub repository vim/vim prior to 9.0.0389. | https://nvd.nist.gov/vuln/detail/CVE-2022-3134 |
459,400 | vim | ccfde4d028e891a41e3548323c3d47b06fb0b83e | https://github.com/vim/vim | https://github.com/vim/vim/commit/ccfde4d028e891a41e3548323c3d47b06fb0b83e | patch 9.0.0389: crash when 'tagfunc' closes the window
Problem: Crash when 'tagfunc' closes the window.
Solution: Bail out when the window was closed. | 0 | do_tag(
char_u *tag, // tag (pattern) to jump to
int type,
int count,
int forceit, // :ta with !
int verbose) // print "tag not found" message
{
taggy_T *tagstack = curwin->w_tagstack;
int tagstackidx = curwin->w_tagstackidx;
int tagstacklen = curwin->w_tagstacklen;
int cur_m... | 294928399408778524511468577192657953231 | None | CWE-416 | CVE-2022-3134 | Use After Free in GitHub repository vim/vim prior to 9.0.0389. | https://nvd.nist.gov/vuln/detail/CVE-2022-3134 | |
212,436 | linux | 30e29a9a2bc6a4888335a6ede968b75cd329657a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a | bpf: Fix integer overflow in prealloc_elems_and_freelist()
In prealloc_elems_and_freelist(), the multiplication to calculate the
size passed to bpf_map_area_alloc() could lead to an integer overflow.
As a result, out-of-bounds write could occur in pcpu_freelist_populate()
as reported by KASAN:
[...]
[ 16.968613] BU... | 1 | static int prealloc_elems_and_freelist(struct bpf_stack_map *smap)
{
u32 elem_size = sizeof(struct stack_map_bucket) + smap->map.value_size;
int err;
smap->elems = bpf_map_area_alloc(elem_size * smap->map.max_entries,
smap->map.numa_node);
if (!smap->elems)
return -ENOMEM;
err = pcpu_freelist_init(&smap-... | 178134261771669129761013963339102987528 | stackmap.c | 212947868785159241816012605096544782433 | CWE-787 | CVE-2021-41864 | prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2021-41864 |
459,524 | linux | 30e29a9a2bc6a4888335a6ede968b75cd329657a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a | bpf: Fix integer overflow in prealloc_elems_and_freelist()
In prealloc_elems_and_freelist(), the multiplication to calculate the
size passed to bpf_map_area_alloc() could lead to an integer overflow.
As a result, out-of-bounds write could occur in pcpu_freelist_populate()
as reported by KASAN:
[...]
[ 16.968613] BU... | 0 | static int prealloc_elems_and_freelist(struct bpf_stack_map *smap)
{
u64 elem_size = sizeof(struct stack_map_bucket) +
(u64)smap->map.value_size;
int err;
smap->elems = bpf_map_area_alloc(elem_size * smap->map.max_entries,
smap->map.numa_node);
if (!smap->elems)
return -ENOMEM;
err = pcpu_freelist_ini... | 247842121005492107026661682297731302199 | stackmap.c | 198452357082465344097055898312719400384 | CWE-787 | CVE-2021-41864 | prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2021-41864 |
212,834 | rsyslog | 0381a0de64a5a048c3d48b79055bd9848d0c7fc2 | https://github.com/rsyslog/rsyslog | https://github.com/rsyslog/rsyslog/commit/0381a0de64a5a048c3d48b79055bd9848d0c7fc2 | imptcp: fix Segmentation Fault when octet count is to high | 1 | processDataRcvd(ptcpsess_t *const __restrict__ pThis,
char **buff,
const int buffLen,
struct syslogTime *stTime,
const time_t ttGenTime,
multi_submit_t *pMultiSub,
unsigned *const __restrict__ pnMsgs)
{
DEFiRet;
char c = **buff;
int octatesToCopy, octatesToDiscard;
if(pThis->inputState == eAtStrtFram) {
if... | 175845780697344678841951403700990960175 | imptcp.c | 66608949268386945207139768258979939814 | CWE-190 | CVE-2018-16881 | A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable. | https://nvd.nist.gov/vuln/detail/CVE-2018-16881 |
462,409 | rsyslog | 0381a0de64a5a048c3d48b79055bd9848d0c7fc2 | https://github.com/rsyslog/rsyslog | https://github.com/rsyslog/rsyslog/commit/0381a0de64a5a048c3d48b79055bd9848d0c7fc2 | imptcp: fix Segmentation Fault when octet count is to high | 0 | processDataRcvd(ptcpsess_t *const __restrict__ pThis,
char **buff,
const int buffLen,
struct syslogTime *stTime,
const time_t ttGenTime,
multi_submit_t *pMultiSub,
unsigned *const __restrict__ pnMsgs)
{
DEFiRet;
char c = **buff;
int octatesToCopy, octatesToDiscard;
if(pThis->inputState == eAtStrtFram) {
if... | 319180109338452321529530788318348241217 | imptcp.c | 222511081390723120608536252618686301143 | CWE-190 | CVE-2018-16881 | A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable. | https://nvd.nist.gov/vuln/detail/CVE-2018-16881 |
212,857 | vim | 4f1b083be43f351bc107541e7b0c9655a5d2c0bb | https://github.com/vim/vim | https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb | patch 9.0.0322: crash when no errors and 'quickfixtextfunc' is set
Problem: Crash when no errors and 'quickfixtextfunc' is set.
Solution: Do not handle errors if there aren't any. | 1 | qf_fill_buffer(qf_list_T *qfl, buf_T *buf, qfline_T *old_last, int qf_winid)
{
linenr_T lnum;
qfline_T *qfp;
int old_KeyTyped = KeyTyped;
list_T *qftf_list = NULL;
listitem_T *qftf_li = NULL;
if (old_last == NULL)
{
if (buf != curbuf)
{
internal_error("qf_fill_buffer()");
retur... | 19896236176049682773029755500370526703 | quickfix.c | 67097038911895244025002740290880368768 | CWE-416 | CVE-2022-3037 | Use After Free in GitHub repository vim/vim prior to 9.0.0322. | https://nvd.nist.gov/vuln/detail/CVE-2022-3037 |
462,511 | vim | 4f1b083be43f351bc107541e7b0c9655a5d2c0bb | https://github.com/vim/vim | https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb | patch 9.0.0322: crash when no errors and 'quickfixtextfunc' is set
Problem: Crash when no errors and 'quickfixtextfunc' is set.
Solution: Do not handle errors if there aren't any. | 0 | qf_fill_buffer(qf_list_T *qfl, buf_T *buf, qfline_T *old_last, int qf_winid)
{
linenr_T lnum;
qfline_T *qfp;
int old_KeyTyped = KeyTyped;
list_T *qftf_list = NULL;
listitem_T *qftf_li = NULL;
if (old_last == NULL)
{
if (buf != curbuf)
{
internal_error("qf_fill_buffer()");
retur... | 333242954823260199301291407740047378845 | quickfix.c | 221790887990910120742119728344121157301 | CWE-416 | CVE-2022-3037 | Use After Free in GitHub repository vim/vim prior to 9.0.0322. | https://nvd.nist.gov/vuln/detail/CVE-2022-3037 |
212,934 | cyrus-imapd | 621f9e41465b521399f691c241181300fab55995 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/621f9e41465b521399f691c241181300fab55995 | annotate: don't allow everyone to write shared server entries | 1 | static int write_entry(struct mailbox *mailbox,
unsigned int uid,
const char *entry,
const char *userid,
const struct buf *value,
int ignorequota,
int silent,
... | 63211042070136121773849314849857565491 | annotate.c | 152032054661376167383830098805318046193 | CWE-732 | CVE-2021-32056 | Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall. | https://nvd.nist.gov/vuln/detail/CVE-2021-32056 |
463,134 | cyrus-imapd | 621f9e41465b521399f691c241181300fab55995 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/621f9e41465b521399f691c241181300fab55995 | annotate: don't allow everyone to write shared server entries | 0 | static int write_entry(struct mailbox *mailbox,
unsigned int uid,
const char *entry,
const char *userid,
const struct buf *value,
int ignorequota,
int silent,
... | 337608514204534148463343228875212022606 | annotate.c | 55084981439029014796527313329432397099 | CWE-732 | CVE-2021-32056 | Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall. | https://nvd.nist.gov/vuln/detail/CVE-2021-32056 |
212,955 | linux | 82e31755e55fbcea6a9dfaae5fe4860ade17cbc0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0 | ax25: Fix UAF bugs in ax25 timers
There are race conditions that may lead to UAF bugs in
ax25_heartbeat_expiry(), ax25_t1timer_expiry(), ax25_t2timer_expiry(),
ax25_t3timer_expiry() and ax25_idletimer_expiry(), when we call
ax25_release() to deallocate ax25_dev.
One of the UAF bugs caused by ax25_release() is shown b... | 1 | static int ax25_release(struct socket *sock)
{
struct sock *sk = sock->sk;
ax25_cb *ax25;
ax25_dev *ax25_dev;
if (sk == NULL)
return 0;
sock_hold(sk);
lock_sock(sk);
sock_orphan(sk);
ax25 = sk_to_ax25(sk);
ax25_dev = ax25->ax25_dev;
if (sk->sk_type == SOCK_SEQPACKET) {
switch (ax25->state) {
case AX2... | 322863638930156349228190868934879958122 | af_ax25.c | 161595370162210735322175103800372569534 | CWE-476 | CVE-2022-1205 | A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system. | https://nvd.nist.gov/vuln/detail/CVE-2022-1205 |
463,476 | linux | 82e31755e55fbcea6a9dfaae5fe4860ade17cbc0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/82e31755e55fbcea6a9dfaae5fe4860ade17cbc0 | ax25: Fix UAF bugs in ax25 timers
There are race conditions that may lead to UAF bugs in
ax25_heartbeat_expiry(), ax25_t1timer_expiry(), ax25_t2timer_expiry(),
ax25_t3timer_expiry() and ax25_idletimer_expiry(), when we call
ax25_release() to deallocate ax25_dev.
One of the UAF bugs caused by ax25_release() is shown b... | 0 | static int ax25_release(struct socket *sock)
{
struct sock *sk = sock->sk;
ax25_cb *ax25;
ax25_dev *ax25_dev;
if (sk == NULL)
return 0;
sock_hold(sk);
lock_sock(sk);
sock_orphan(sk);
ax25 = sk_to_ax25(sk);
ax25_dev = ax25->ax25_dev;
if (sk->sk_type == SOCK_SEQPACKET) {
switch (ax25->state) {
case AX2... | 148812270576683691154381215671514833423 | af_ax25.c | 305687071181329049431144170214324654974 | CWE-476 | CVE-2022-1205 | A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system. | https://nvd.nist.gov/vuln/detail/CVE-2022-1205 |
213,037 | php-src | 2bcbc95f033c31b00595ed39f79c3a99b4ed0501 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=2bcbc95f033c31b00595ed39f79c3a99b4ed0501 | Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`) | 1 | mbfl_filt_conv_big5_wchar(int c, mbfl_convert_filter *filter)
{
int k;
int c1, w, c2;
switch (filter->status) {
case 0:
if (filter->from->no_encoding == mbfl_no_encoding_cp950) {
c1 = 0x80;
} else {
c1 = 0xa0;
}
if (c >= 0 && c <= 0x80) { /* latin */
CK((*filter->output_function)(c, filter->data)... | 8283586201644887300915898295948875795 | mbfilter_big5.c | 67113767760618335945735132719612525083 | CWE-125 | CVE-2020-7060 | When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-7060 |
464,942 | php-src | 2bcbc95f033c31b00595ed39f79c3a99b4ed0501 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=2bcbc95f033c31b00595ed39f79c3a99b4ed0501 | Fix bug #79037 (global buffer-overflow in `mbfl_filt_conv_big5_wchar`) | 0 | mbfl_filt_conv_big5_wchar(int c, mbfl_convert_filter *filter)
{
int k;
int c1, w, c2;
switch (filter->status) {
case 0:
if (filter->from->no_encoding == mbfl_no_encoding_cp950) {
c1 = 0x80;
} else {
c1 = 0xa0;
}
if (c >= 0 && c <= 0x80) { /* latin */
CK((*filter->output_function)(c, filter->data)... | 324298547167958214830404594575086371894 | mbfilter_big5.c | 135358838595920427772392870415942108469 | CWE-125 | CVE-2020-7060 | When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-7060 |
213,075 | linux | d270453a0d9ec10bb8a802a142fb1b3601a83098 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 | nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs
There are destructive operations such as nfcmrvl_fw_dnld_abort and
gpio_free in nfcmrvl_nci_unregister_dev. The resources such as firmware,
gpio and so on could be destructed while the upper layer functions such as
nfcmrvl_f... | 1 | void nfcmrvl_nci_unregister_dev(struct nfcmrvl_private *priv)
{
struct nci_dev *ndev = priv->ndev;
if (priv->ndev->nfc_dev->fw_download_in_progress)
nfcmrvl_fw_dnld_abort(priv);
nfcmrvl_fw_dnld_deinit(priv);
if (gpio_is_valid(priv->config.reset_n_io))
gpio_free(priv->config.reset_n_io);
nci_unregister_devi... | 80022393435189393698798858771068403226 | main.c | 269589724165464795755961413543377431257 | CWE-416 | CVE-2022-1734 | A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine. | https://nvd.nist.gov/vuln/detail/CVE-2022-1734 |
465,854 | linux | d270453a0d9ec10bb8a802a142fb1b3601a83098 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 | nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs
There are destructive operations such as nfcmrvl_fw_dnld_abort and
gpio_free in nfcmrvl_nci_unregister_dev. The resources such as firmware,
gpio and so on could be destructed while the upper layer functions such as
nfcmrvl_f... | 0 | void nfcmrvl_nci_unregister_dev(struct nfcmrvl_private *priv)
{
struct nci_dev *ndev = priv->ndev;
nci_unregister_device(ndev);
if (priv->ndev->nfc_dev->fw_download_in_progress)
nfcmrvl_fw_dnld_abort(priv);
nfcmrvl_fw_dnld_deinit(priv);
if (gpio_is_valid(priv->config.reset_n_io))
gpio_free(priv->config.rese... | 316889922482617255369760811895973398042 | main.c | 72783035661229533043408251312926412443 | CWE-416 | CVE-2022-1734 | A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine. | https://nvd.nist.gov/vuln/detail/CVE-2022-1734 |
213,370 | glib | d553d92d6e9f53cbe5a34166fcb919ba652c6a8e | https://gitlab.gnome.org/GNOME/glib | https://gitlab.gnome.org/GNOME/glib/commit/d553d92d6e9f53cbe5a34166fcb919ba652c6a8e | gsocketclient: Fix criticals
This ensures the parent GTask is kept alive as long as an enumeration
is running and trying to connect.
Closes #1646
Closes #1649 | 1 | g_socket_client_connected_callback (GObject *source,
GAsyncResult *result,
gpointer user_data)
{
ConnectionAttempt *attempt = user_data;
GSocketClientAsyncConnectData *data = attempt->data;
GSList *l;
GError *error = NULL;
GProxy *proxy;
const gchar *protocol;
/* data is NULL on... | 303931634452049999477477859565079753152 | gsocketclient.c | 112189477762116433441013263383719019263 | CWE-754 | CVE-2019-9633 | gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrate... | https://nvd.nist.gov/vuln/detail/CVE-2019-9633 |
468,349 | glib | d553d92d6e9f53cbe5a34166fcb919ba652c6a8e | https://gitlab.gnome.org/GNOME/glib | https://gitlab.gnome.org/GNOME/glib/commit/d553d92d6e9f53cbe5a34166fcb919ba652c6a8e | gsocketclient: Fix criticals
This ensures the parent GTask is kept alive as long as an enumeration
is running and trying to connect.
Closes #1646
Closes #1649 | 0 | g_socket_client_connected_callback (GObject *source,
GAsyncResult *result,
gpointer user_data)
{
ConnectionAttempt *attempt = user_data;
GSocketClientAsyncConnectData *data = attempt->data;
GSList *l;
GError *error = NULL;
GProxy *proxy;
const gchar *protocol;
if (g_cancellable_... | 284257451684326472377624066772232784907 | gsocketclient.c | 157905572963596557383512485968044873989 | CWE-754 | CVE-2019-9633 | gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote attackers to cause a denial of service (g_socket_client_connected_callback mishandling and application crash) via a crafted web site, as demonstrate... | https://nvd.nist.gov/vuln/detail/CVE-2019-9633 |
213,515 | vim | 5c68617d395f9d7b824f68475b24ce3e38d653a3 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 | patch 8.2.4563: "z=" in Visual mode may go beyond the end of the line
Problem: "z=" in Visual mode may go beyond the end of the line.
Solution: Adjust "badlen". | 1 | spell_suggest(int count)
{
char_u *line;
pos_T prev_cursor = curwin->w_cursor;
char_u wcopy[MAXWLEN + 2];
char_u *p;
int i;
int c;
suginfo_T sug;
suggest_T *stp;
int mouse_used;
int need_cap;
int limit;
int selected = count;
int badlen = 0;
int msg_scroll_... | 283321822802394416488141327214287342104 | spellsuggest.c | 284064000006918275605147443263550733278 | CWE-787 | CVE-2022-0943 | Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563. | https://nvd.nist.gov/vuln/detail/CVE-2022-0943 |
471,902 | vim | 5c68617d395f9d7b824f68475b24ce3e38d653a3 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 | patch 8.2.4563: "z=" in Visual mode may go beyond the end of the line
Problem: "z=" in Visual mode may go beyond the end of the line.
Solution: Adjust "badlen". | 0 | spell_suggest(int count)
{
char_u *line;
pos_T prev_cursor = curwin->w_cursor;
char_u wcopy[MAXWLEN + 2];
char_u *p;
int i;
int c;
suginfo_T sug;
suggest_T *stp;
int mouse_used;
int need_cap;
int limit;
int selected = count;
int badlen = 0;
int msg_scroll_... | 210769611717793726730537343470434116318 | spellsuggest.c | 285304759407649884654167568930599876914 | CWE-787 | CVE-2022-0943 | Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563. | https://nvd.nist.gov/vuln/detail/CVE-2022-0943 |
213,528 | linux | 3b0462726e7ef281c35a7a4ae33e93ee2bc9975b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b | cgroup: verify that source is a string
The following sequence can be used to trigger a UAF:
int fscontext_fd = fsopen("cgroup");
int fd_null = open("/dev/null, O_RDONLY);
int fsconfig(fscontext_fd, FSCONFIG_SET_FD, "source", fd_null);
close_range(3, ~0U, 0);
The cgroup v1 specific fs parser expects a... | 1 | int cgroup1_parse_param(struct fs_context *fc, struct fs_parameter *param)
{
struct cgroup_fs_context *ctx = cgroup_fc2context(fc);
struct cgroup_subsys *ss;
struct fs_parse_result result;
int opt, i;
opt = fs_parse(fc, cgroup1_fs_parameters, param, &result);
if (opt == -ENOPARAM) {
if (strcmp(param->key, "sou... | 2447930720327269598694221319559062155 | cgroup-v1.c | 304027161926251240992448703175506915313 | CWE-416 | CVE-2021-4154 | A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system. | https://nvd.nist.gov/vuln/detail/CVE-2021-4154 |
472,123 | linux | 3b0462726e7ef281c35a7a4ae33e93ee2bc9975b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b0462726e7ef281c35a7a4ae33e93ee2bc9975b | cgroup: verify that source is a string
The following sequence can be used to trigger a UAF:
int fscontext_fd = fsopen("cgroup");
int fd_null = open("/dev/null, O_RDONLY);
int fsconfig(fscontext_fd, FSCONFIG_SET_FD, "source", fd_null);
close_range(3, ~0U, 0);
The cgroup v1 specific fs parser expects a... | 0 | int cgroup1_parse_param(struct fs_context *fc, struct fs_parameter *param)
{
struct cgroup_fs_context *ctx = cgroup_fc2context(fc);
struct cgroup_subsys *ss;
struct fs_parse_result result;
int opt, i;
opt = fs_parse(fc, cgroup1_fs_parameters, param, &result);
if (opt == -ENOPARAM) {
if (strcmp(param->key, "sou... | 334870785845210346899642963550735857549 | cgroup-v1.c | 43168048456517404384153301721017353964 | CWE-416 | CVE-2021-4154 | A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system. | https://nvd.nist.gov/vuln/detail/CVE-2021-4154 |
213,998 | libtpms | ea62fd9679f8c6fc5e79471b33cfbd8227bfed72 | https://github.com/stefanberger/libtpms | https://github.com/stefanberger/libtpms/commit/ea62fd9679f8c6fc5e79471b33cfbd8227bfed72 | tpm2: Initialize a whole OBJECT before using it
Initialize a whole OBJECT before using it. This is necessary since
an OBJECT may also be used as a HASH_OBJECT via the ANY_OBJECT
union and that HASH_OBJECT can leave bad size inidicators in TPM2B
buffer in the OBJECT. To get rid of this problem we reset the whole
OBJECT... | 1 | FindEmptyObjectSlot(
TPMI_DH_OBJECT *handle // OUT: (optional)
)
{
UINT32 i;
OBJECT *object;
for(i = 0; i < MAX_LOADED_OBJECTS; i++)
{
object = &s_objects[i];
if(object->attributes.occupied == CLEAR)
{
if(handle)
*handle = i + TRANSIENT_F... | 267307307566893737550652048570735094605 | Object.c | 21721239087984404174741324804041111077 | CWE-119 | CVE-2021-3746 | A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availab... | https://nvd.nist.gov/vuln/detail/CVE-2021-3746 |
474,434 | libtpms | ea62fd9679f8c6fc5e79471b33cfbd8227bfed72 | https://github.com/stefanberger/libtpms | https://github.com/stefanberger/libtpms/commit/ea62fd9679f8c6fc5e79471b33cfbd8227bfed72 | tpm2: Initialize a whole OBJECT before using it
Initialize a whole OBJECT before using it. This is necessary since
an OBJECT may also be used as a HASH_OBJECT via the ANY_OBJECT
union and that HASH_OBJECT can leave bad size inidicators in TPM2B
buffer in the OBJECT. To get rid of this problem we reset the whole
OBJECT... | 0 | FindEmptyObjectSlot(
TPMI_DH_OBJECT *handle // OUT: (optional)
)
{
UINT32 i;
OBJECT *object;
for(i = 0; i < MAX_LOADED_OBJECTS; i++)
{
object = &s_objects[i];
if(object->attributes.occupied == CLEAR)
{
if(handle)
*handle = i + TRANSIENT_F... | 327698206124968939324347029407328822774 | Object.c | 122617348389867631937316179213551374827 | CWE-119 | CVE-2021-3746 | A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availab... | https://nvd.nist.gov/vuln/detail/CVE-2021-3746 |
214,124 | chafa | e6ce3746cdcf0836b9dae659a5aed15d73a080d8 | https://github.com/hpjansson/chafa | https://github.com/hpjansson/chafa/commit/e6ce3746cdcf0836b9dae659a5aed15d73a080d8 | libnsgif: fix oob in lzw_decode | 1 | lzw_result lzw_decode(struct lzw_ctx *ctx,
const uint8_t ** const stack_pos_out)
{
lzw_result res;
uint32_t code_new;
uint32_t code_out;
uint8_t last_value;
uint8_t *stack_pos = ctx->stack_base;
uint32_t clear_code = ctx->clear_code;
uint32_t current_entry = ctx->current_entry;
struct lzw_dictionary_entry * c... | 197312030105469318680562726195282198881 | lzw.c | 206609516216923718063023254663769273017 | CWE-125 | CVE-2022-2061 | Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2061 |
475,987 | chafa | e6ce3746cdcf0836b9dae659a5aed15d73a080d8 | https://github.com/hpjansson/chafa | https://github.com/hpjansson/chafa/commit/e6ce3746cdcf0836b9dae659a5aed15d73a080d8 | libnsgif: fix oob in lzw_decode | 0 | lzw_result lzw_decode(struct lzw_ctx *ctx,
const uint8_t ** const stack_pos_out)
{
lzw_result res;
uint32_t code_new;
uint32_t code_out;
uint8_t last_value;
uint8_t *stack_pos = ctx->stack_base;
uint32_t clear_code = ctx->clear_code;
uint32_t current_entry = ctx->current_entry;
struct lzw_dictionary_entry * c... | 232258018845507324994493987384082077230 | lzw.c | 168965779407481929590316655829608211083 | CWE-125 | CVE-2022-2061 | Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2061 |
214,276 | linux | fa40d9734a57bcbfa79a280189799f76c88f7bb0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0 | tipc: fix size validations for the MSG_CRYPTO type
The function tipc_crypto_key_rcv is used to parse MSG_CRYPTO messages
to receive keys from other nodes in the cluster in order to decrypt any
further messages from them.
This patch verifies that any supplied sizes in the message body are
valid for the received message... | 1 | static bool tipc_crypto_key_rcv(struct tipc_crypto *rx, struct tipc_msg *hdr)
{
struct tipc_crypto *tx = tipc_net(rx->net)->crypto_tx;
struct tipc_aead_key *skey = NULL;
u16 key_gen = msg_key_gen(hdr);
u16 size = msg_data_sz(hdr);
u8 *data = msg_data(hdr);
spin_lock(&rx->lock);
if (unlikely(rx->skey || (key_gen... | 150450145750082729683403565650901445106 | crypto.c | 58733917967082493268842355411939930161 | CWE-20 | CVE-2021-43267 | An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type. | https://nvd.nist.gov/vuln/detail/CVE-2021-43267 |
477,273 | linux | fa40d9734a57bcbfa79a280189799f76c88f7bb0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa40d9734a57bcbfa79a280189799f76c88f7bb0 | tipc: fix size validations for the MSG_CRYPTO type
The function tipc_crypto_key_rcv is used to parse MSG_CRYPTO messages
to receive keys from other nodes in the cluster in order to decrypt any
further messages from them.
This patch verifies that any supplied sizes in the message body are
valid for the received message... | 0 | static bool tipc_crypto_key_rcv(struct tipc_crypto *rx, struct tipc_msg *hdr)
{
struct tipc_crypto *tx = tipc_net(rx->net)->crypto_tx;
struct tipc_aead_key *skey = NULL;
u16 key_gen = msg_key_gen(hdr);
u16 size = msg_data_sz(hdr);
u8 *data = msg_data(hdr);
unsigned int keylen;
/* Verify whether the size can exi... | 21444025468428283247999063273803236471 | crypto.c | 97644738698722030133364122587095840919 | CWE-20 | CVE-2021-43267 | An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type. | https://nvd.nist.gov/vuln/detail/CVE-2021-43267 |
214,282 | radare2 | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | 1 | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offs... | 64487889579921550880626488390413278294 | None | CWE-787 | CVE-2022-0518 | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0518 | |
477,380 | radare2 | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | 0 | R_API RBinJavaAttrInfo *r_bin_java_inner_classes_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
RBinJavaClassesAttribute *icattr;
RBinJavaAttrInfo *attr = NULL;
RBinJavaCPTypeObj *obj;
ut32 i = 0;
ut64 offset = 0, curpos;
attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
offs... | 64877756474443733674480622739162380352 | None | CWE-787 | CVE-2022-0518 | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0518 | |
214,335 | ceph | be7679007c3dfab3e19c22c38c36ccac91828e3b | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/be7679007c3dfab3e19c22c38c36ccac91828e3b | rgw: reject control characters in response-header actions
S3 GetObject permits overriding response header values, but those inputs
need to be validated to insure only characters that are valid in an HTTP
header value are present.
Credit: Initial vulnerability discovery by William Bowling (@wcbowling)
Credit: Further ... | 1 | int RGWGetObj_ObjStore_S3::send_response_data(bufferlist& bl, off_t bl_ofs,
off_t bl_len)
{
const char *content_type = NULL;
string content_type_str;
map<string, string> response_attrs;
map<string, string>::iterator riter;
bufferlist metadata_bl;
string expires = get_s3_expiration_header(s, last... | 252320959275346519647300715417843120718 | rgw_rest_s3.cc | 121704064633287557349192949015382644860 | CWE-79 | CVE-2020-1760 | A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input. | https://nvd.nist.gov/vuln/detail/CVE-2020-1760 |
477,800 | ceph | be7679007c3dfab3e19c22c38c36ccac91828e3b | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/be7679007c3dfab3e19c22c38c36ccac91828e3b | rgw: reject control characters in response-header actions
S3 GetObject permits overriding response header values, but those inputs
need to be validated to insure only characters that are valid in an HTTP
header value are present.
Credit: Initial vulnerability discovery by William Bowling (@wcbowling)
Credit: Further ... | 0 | int RGWGetObj_ObjStore_S3::send_response_data(bufferlist& bl, off_t bl_ofs,
off_t bl_len)
{
const char *content_type = NULL;
string content_type_str;
map<string, string> response_attrs;
map<string, string>::iterator riter;
bufferlist metadata_bl;
string expires = get_s3_expiration_header(s, last... | 262581748288231212684344001949485433363 | rgw_rest_s3.cc | 18601801279536370570230302891439737230 | CWE-79 | CVE-2020-1760 | A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input. | https://nvd.nist.gov/vuln/detail/CVE-2020-1760 |
214,339 | linux | f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
The kvmppc_rtas_hcall() sets the host rtas_args.rets pointer based on
the rtas_args.nargs that was provided by the guest. That guest nargs
value is not range checked, so the guest can cause the host rets pointer
to be pointed outside the args array. The individual rtas... | 1 | int kvmppc_rtas_hcall(struct kvm_vcpu *vcpu)
{
struct rtas_token_definition *d;
struct rtas_args args;
rtas_arg_t *orig_rets;
gpa_t args_phys;
int rc;
/*
* r4 contains the guest physical address of the RTAS args
* Mask off the top 4 bits since this is a guest real address
*/
args_phys = kvmppc_get_gpr(vcp... | 66579788869283176691450230454774242085 | book3s_rtas.c | 244969410022637408362665450874858593503 | CWE-787 | CVE-2021-37576 | arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. | https://nvd.nist.gov/vuln/detail/CVE-2021-37576 |
477,811 | linux | f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
The kvmppc_rtas_hcall() sets the host rtas_args.rets pointer based on
the rtas_args.nargs that was provided by the guest. That guest nargs
value is not range checked, so the guest can cause the host rets pointer
to be pointed outside the args array. The individual rtas... | 0 | int kvmppc_rtas_hcall(struct kvm_vcpu *vcpu)
{
struct rtas_token_definition *d;
struct rtas_args args;
rtas_arg_t *orig_rets;
gpa_t args_phys;
int rc;
/*
* r4 contains the guest physical address of the RTAS args
* Mask off the top 4 bits since this is a guest real address
*/
args_phys = kvmppc_get_gpr(vcp... | 270253933279643819807414798855847113264 | book3s_rtas.c | 244634684304024017969354424959522055540 | CWE-787 | CVE-2021-37576 | arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e. | https://nvd.nist.gov/vuln/detail/CVE-2021-37576 |
214,358 | clamav-devel | 224fee54dd6cd8933d7007331ec2bfca0398d4b4 | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=224fee54dd6cd8933d7007331ec2bfca0398d4b4 | libclamav/mspack.c: fix Quantum decompressor (bb#1771) | 1 | int qtm_decompress(struct qtm_stream *qtm, off_t out_bytes) {
unsigned int frame_start, frame_end, window_posn, match_offset, range;
unsigned char *window, *i_ptr, *i_end, *runsrc, *rundest;
int i, j, selector, extra, sym, match_length, ret;
unsigned short H, L, C, symf;
register unsigned int bit_buffer;
r... | 291050376752284006088755347145639053650 | mspack.c | 137114659534783781079186144852150621076 | CWE-20 | CVE-2010-1311 | The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2010-1311 |
477,946 | clamav-devel | 224fee54dd6cd8933d7007331ec2bfca0398d4b4 | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=224fee54dd6cd8933d7007331ec2bfca0398d4b4 | libclamav/mspack.c: fix Quantum decompressor (bb#1771) | 0 | int qtm_decompress(struct qtm_stream *qtm, off_t out_bytes) {
unsigned int frame_start, frame_end, window_posn, match_offset, range;
unsigned char *window, *i_ptr, *i_end, *runsrc, *rundest;
int i, j, selector, extra, sym, match_length, ret;
unsigned short H, L, C, symf;
register unsigned int bit_buffer;
r... | 309561544522405112370599990059884786931 | mspack.c | 294647704290965311324683497678599566631 | CWE-20 | CVE-2010-1311 | The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2010-1311 |
214,948 | nagioscore | b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76 | https://github.com/NagiosEnterprises/nagioscore | https://github.com/NagiosEnterprises/nagioscore/commit/b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76 | merge accidental master PR (#553) into maint and fix changelog
merge conflict | 1 | static int qh_help(int sd, char *buf, unsigned int len)
{
struct query_handler *qh = NULL;
if (!*buf || !strcmp(buf, "help")) {
nsock_printf_nul(sd,
" help <name> show help for handler <name>\n"
" help list list registered handlers\n");
return 0;
}
if (!strcmp(buf, "list")) {
for (qh = qhandl... | 94205848469413247134990431510795041073 | query-handler.c | 69411467652185615530893490033539842403 | CWE-476 | CVE-2018-13441 | qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-13441 |
481,787 | nagioscore | b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76 | https://github.com/NagiosEnterprises/nagioscore | https://github.com/NagiosEnterprises/nagioscore/commit/b1a92a3b52d292ccb601e77a0b29cb1e67ac9d76 | merge accidental master PR (#553) into maint and fix changelog
merge conflict | 0 | static int qh_help(int sd, char *buf, unsigned int len)
{
struct query_handler *qh = NULL;
if (buf == NULL || !strcmp(buf, "help")) {
nsock_printf_nul(sd,
" help <name> show help for handler <name>\n"
" help list list registered handlers\n");
return 0;
}
if (!strcmp(buf, "list")) {
for (qh = ... | 205155132129673453942496407625358391443 | query-handler.c | 275184931270866221094094086326042798019 | CWE-476 | CVE-2018-13441 | qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket. | https://nvd.nist.gov/vuln/detail/CVE-2018-13441 |
214,997 | liblouis | 2e4772befb2b1c37cb4b9d6572945115ee28630a | https://github.com/liblouis/liblouis | https://github.com/liblouis/liblouis/commit/2e4772befb2b1c37cb4b9d6572945115ee28630a | Prevent an invalid memory writes in compileRule
Thanks to Han Zheng for reporting it
Fixes #1214 | 1 | compileRule(FileInfo *file, TranslationTableHeader **table,
DisplayTableHeader **displayTable, const MacroList **inScopeMacros) {
CharsString token;
TranslationTableOpcode opcode;
CharsString ruleChars;
CharsString ruleDots;
CharsString cells;
CharsString scratchPad;
CharsString emphClass;
TranslationTableCha... | 114188111189139492438388270487144198902 | compileTranslationTable.c | 130160890521779483138755278607355501086 | CWE-787 | CVE-2022-31783 | Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace. | https://nvd.nist.gov/vuln/detail/CVE-2022-31783 |
482,533 | liblouis | 2e4772befb2b1c37cb4b9d6572945115ee28630a | https://github.com/liblouis/liblouis | https://github.com/liblouis/liblouis/commit/2e4772befb2b1c37cb4b9d6572945115ee28630a | Prevent an invalid memory writes in compileRule
Thanks to Han Zheng for reporting it
Fixes #1214 | 0 | compileRule(FileInfo *file, TranslationTableHeader **table,
DisplayTableHeader **displayTable, const MacroList **inScopeMacros) {
CharsString token;
TranslationTableOpcode opcode;
CharsString ruleChars;
CharsString ruleDots;
CharsString cells;
CharsString scratchPad;
CharsString emphClass;
TranslationTableCha... | 188995041946566375099409962387038802381 | compileTranslationTable.c | 129515444966510079462991982245291196170 | CWE-787 | CVE-2022-31783 | Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace. | https://nvd.nist.gov/vuln/detail/CVE-2022-31783 |
215,038 | gst-plugins-good | b31c504645a814c59d91d49e4fe218acaf93f4ca | https://github.com/GStreamer/gst-plugins-good | https://github.com/GStreamer/gst-plugins-good/commit/b31c504645a814c59d91d49e4fe218acaf93f4ca | flxdec: Don't unref() parent in the chain function
We don't own the reference here, it is owned by the caller and given to
us for the scope of this function. Leftover mistake from 0.10 porting.
https://bugzilla.gnome.org/show_bug.cgi?id=774897 | 1 | gst_flxdec_chain (GstPad * pad, GstObject * parent, GstBuffer * buf)
{
GstCaps *caps;
guint avail;
GstFlowReturn res = GST_FLOW_OK;
GstFlxDec *flxdec;
FlxHeader *flxh;
g_return_val_if_fail (buf != NULL, GST_FLOW_ERROR);
flxdec = (GstFlxDec *) parent;
g_return_val_if_fail (flxdec != NULL, GST_FLOW_ERRO... | 293682781429111556527181973502820056353 | gstflxdec.c | 257993996858330004218595538099349772474 | CWE-125 | CVE-2016-9810 | The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call. | https://nvd.nist.gov/vuln/detail/CVE-2016-9810 |
482,692 | gst-plugins-good | b31c504645a814c59d91d49e4fe218acaf93f4ca | https://github.com/GStreamer/gst-plugins-good | https://github.com/GStreamer/gst-plugins-good/commit/b31c504645a814c59d91d49e4fe218acaf93f4ca | flxdec: Don't unref() parent in the chain function
We don't own the reference here, it is owned by the caller and given to
us for the scope of this function. Leftover mistake from 0.10 porting.
https://bugzilla.gnome.org/show_bug.cgi?id=774897 | 0 | gst_flxdec_chain (GstPad * pad, GstObject * parent, GstBuffer * buf)
{
GstCaps *caps;
guint avail;
GstFlowReturn res = GST_FLOW_OK;
GstFlxDec *flxdec;
FlxHeader *flxh;
g_return_val_if_fail (buf != NULL, GST_FLOW_ERROR);
flxdec = (GstFlxDec *) parent;
g_return_val_if_fail (flxdec != NULL, GST_FLOW_ERRO... | 307699482792832838844638071066338187796 | gstflxdec.c | 15220895690601023240129213899493293437 | CWE-125 | CVE-2016-9810 | The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call. | https://nvd.nist.gov/vuln/detail/CVE-2016-9810 |
215,103 | mongo | a5e2f9b0a236462a6d1ca129583c617f111367b4 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/a5e2f9b0a236462a6d1ca129583c617f111367b4 | SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards
(cherry picked from commit f3604b901d688c194de5e430c7fbab060c9dc8e0) | 1 | createRandomCursorExecutor(const CollectionPtr& coll,
const boost::intrusive_ptr<ExpressionContext>& expCtx,
long long sampleSize,
long long numRecords,
boost::optional<BucketUnpacker> bucketUnpacker) {
Opera... | 101223003381904306346527857489543984398 | None | CWE-617 | CVE-2021-32037 | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e... | https://nvd.nist.gov/vuln/detail/CVE-2021-32037 | |
483,469 | mongo | a5e2f9b0a236462a6d1ca129583c617f111367b4 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/a5e2f9b0a236462a6d1ca129583c617f111367b4 | SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards
(cherry picked from commit f3604b901d688c194de5e430c7fbab060c9dc8e0) | 0 | createRandomCursorExecutor(const CollectionPtr& coll,
const boost::intrusive_ptr<ExpressionContext>& expCtx,
long long sampleSize,
long long numRecords,
boost::optional<BucketUnpacker> bucketUnpacker) {
Opera... | 53510909926140160570175197476495085795 | None | CWE-617 | CVE-2021-32037 | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e... | https://nvd.nist.gov/vuln/detail/CVE-2021-32037 | |
215,312 | linux-2.6 | 9926e4c74300c4b31dee007298c6475d33369df0 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0 | CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix
As discovered here today, the change in Kernel 2.6.17 intended to inhibit
users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by
"cheating" and setting it to 1 in such a case, does not make a difference,
as the check is done in the wrong pla... | 1 | asmlinkage long sys_setrlimit(unsigned int resource, struct rlimit __user *rlim)
{
struct rlimit new_rlim, *old_rlim;
unsigned long it_prof_secs;
int retval;
if (resource >= RLIM_NLIMITS)
return -EINVAL;
if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
return -EFAULT;
if (new_rlim.rlim_cur > new_rlim.rlim... | 308291960942000103777374680863829169927 | None | CWE-20 | CVE-2008-1294 | Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits. | https://nvd.nist.gov/vuln/detail/CVE-2008-1294 | |
487,618 | linux-2.6 | 9926e4c74300c4b31dee007298c6475d33369df0 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0 | CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix
As discovered here today, the change in Kernel 2.6.17 intended to inhibit
users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by
"cheating" and setting it to 1 in such a case, does not make a difference,
as the check is done in the wrong pla... | 0 | asmlinkage long sys_setrlimit(unsigned int resource, struct rlimit __user *rlim)
{
struct rlimit new_rlim, *old_rlim;
unsigned long it_prof_secs;
int retval;
if (resource >= RLIM_NLIMITS)
return -EINVAL;
if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
return -EFAULT;
if (new_rlim.rlim_cur > new_rlim.rlim... | 187909105803248299994402329971280049548 | None | CWE-20 | CVE-2008-1294 | Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits. | https://nvd.nist.gov/vuln/detail/CVE-2008-1294 | |
215,948 | nettle | c71d2c9d20eeebb985e3872e4550137209e3ce4d | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d | Fixed miscomputation bugs in secp-256r1 modulo functions. | 1 | ecc_256_modp (const struct ecc_modulo *p, mp_limb_t *rp)
{
mp_limb_t u1, u0;
mp_size_t n;
n = 2*p->size;
u1 = rp[--n];
u0 = rp[n-1];
/* This is not particularly fast, but should work well with assembly implementation. */
for (; n >= p->size; n--)
{
mp_limb_t q2, q1, q0, t, cy;
/* <q2, q... | 238786089108920286298904536145396627402 | None | CWE-310 | CVE-2015-8803 | The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805. | https://nvd.nist.gov/vuln/detail/CVE-2015-8803 | |
498,160 | nettle | c71d2c9d20eeebb985e3872e4550137209e3ce4d | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d | Fixed miscomputation bugs in secp-256r1 modulo functions. | 0 | ecc_256_modp (const struct ecc_modulo *p, mp_limb_t *rp)
{
mp_limb_t u1, u0;
mp_size_t n;
n = 2*p->size;
u1 = rp[--n];
u0 = rp[n-1];
/* This is not particularly fast, but should work well with assembly implementation. */
for (; n >= p->size; n--)
{
mp_limb_t q2, q1, q0, t, cy;
/* <q2, q... | 9762716495291847327179594432373951677 | None | CWE-310 | CVE-2015-8803 | The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805. | https://nvd.nist.gov/vuln/detail/CVE-2015-8803 | |
216,027 | tar | cb07844454d8cc9fb21f53ace75975f91185a120 | http://git.savannah.gnu.org/cgit/tar | http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | Fix possible NULL dereference (savannah bug #55369)
* src/sparse.c (pax_decode_header): Check return from find_next_block. | 1 | pax_decode_header (struct tar_sparse_file *file)
{
if (file->stat_info->sparse_major > 0)
{
uintmax_t u;
char nbuf[UINTMAX_STRSIZE_BOUND];
union block *blk;
char *p;
size_t i;
off_t start;
#define COPY_BUF(b,buf,src) do \
{ ... | 160355660991121839913024673798590735910 | None | CWE-476 | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 | |
498,918 | tar | cb07844454d8cc9fb21f53ace75975f91185a120 | http://git.savannah.gnu.org/cgit/tar | http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 | Fix possible NULL dereference (savannah bug #55369)
* src/sparse.c (pax_decode_header): Check return from find_next_block. | 0 | pax_decode_header (struct tar_sparse_file *file)
{
if (file->stat_info->sparse_major > 0)
{
uintmax_t u;
char nbuf[UINTMAX_STRSIZE_BOUND];
union block *blk;
char *p;
size_t i;
off_t start;
#define COPY_BUF(b,buf,src) do \
{ ... | 43484957058485536945482588311169940116 | None | CWE-476 | CVE-2019-9923 | pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. | https://nvd.nist.gov/vuln/detail/CVE-2019-9923 | |
216,126 | openssl | cca1cd9a3447dd067503e4a85ebd1679ee78a48e | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/cca1cd9a3447dd067503e4a85ebd1679ee78a48e | Submitted by: Tomas Hoger <thoger@redhat.com>
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted). | 1 | kssl_keytab_is_available(KSSL_CTX *kssl_ctx)
{
krb5_context krb5context = NULL;
krb5_keytab krb5keytab = NULL;
krb5_keytab_entry entry;
krb5_principal princ = NULL;
krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
int rc = 0;
if ((krb5rc = krb5_init_context(&kr... | 99893605133546740733833372677927547347 | None | CWE-20 | CVE-2010-0433 | The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiati... | https://nvd.nist.gov/vuln/detail/CVE-2010-0433 | |
500,044 | openssl | cca1cd9a3447dd067503e4a85ebd1679ee78a48e | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/cca1cd9a3447dd067503e4a85ebd1679ee78a48e | Submitted by: Tomas Hoger <thoger@redhat.com>
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted). | 0 | kssl_keytab_is_available(KSSL_CTX *kssl_ctx)
{
krb5_context krb5context = NULL;
krb5_keytab krb5keytab = NULL;
krb5_keytab_entry entry;
krb5_principal princ = NULL;
krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
int rc = 0;
if ((krb5rc = krb5_init_context(&kr... | 53603406923488065201694869344560864035 | None | CWE-20 | CVE-2010-0433 | The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiati... | https://nvd.nist.gov/vuln/detail/CVE-2010-0433 | |
216,515 | openssl | 939b4960276b040fc0ed52232238fcc9e2e9ec21 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/939b4960276b040fc0ed52232238fcc9e2e9ec21 | Fix race condition in NewSessionTicket
If a NewSessionTicket is received by a multi-threaded client when
attempting to reuse a previous ticket then a race condition can occur
potentially leading to a double free of the ticket data.
CVE-2015-1791
This also fixes RT#3808 where a session ID is changed for a session alr... | 1 | int ssl3_get_new_session_ticket(SSL *s)
{
int ok, al, ret = 0, ticklen;
long n;
const unsigned char *p;
unsigned char *d;
n = s->method->ssl_get_message(s,
SSL3_ST_CR_SESSION_TICKET_A,
SSL3_ST_CR_SESSION_TICKET_B,
... | 262201276305976211218627982974228415604 | None | CWE-362 | CVE-2015-1791 | Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe... | https://nvd.nist.gov/vuln/detail/CVE-2015-1791 | |
502,735 | openssl | 939b4960276b040fc0ed52232238fcc9e2e9ec21 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/939b4960276b040fc0ed52232238fcc9e2e9ec21 | Fix race condition in NewSessionTicket
If a NewSessionTicket is received by a multi-threaded client when
attempting to reuse a previous ticket then a race condition can occur
potentially leading to a double free of the ticket data.
CVE-2015-1791
This also fixes RT#3808 where a session ID is changed for a session alr... | 0 | int ssl3_get_new_session_ticket(SSL *s)
{
int ok, al, ret = 0, ticklen;
long n;
const unsigned char *p;
unsigned char *d;
n = s->method->ssl_get_message(s,
SSL3_ST_CR_SESSION_TICKET_A,
SSL3_ST_CR_SESSION_TICKET_B,
... | 24541052959849141799219681889549728285 | None | CWE-362 | CVE-2015-1791 | Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe... | https://nvd.nist.gov/vuln/detail/CVE-2015-1791 | |
216,637 | guile | 245608911698adb3472803856019bdd5670b6614 | http://git.savannah.gnu.org/cgit/guile | http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=245608911698adb3472803856019bdd5670b6614 | Remove 'umask' calls from 'mkdir'.
Fixes <http://bugs.gnu.org/24659>.
* libguile/filesys.c (SCM_DEFINE): Remove calls to 'umask' when MODE is
unbound; instead, use 0777 as the mode. Update docstring to clarify
this.
* doc/ref/posix.texi (File System): Adjust accordingly.
* NEWS: Mention it. | 1 | SCM_DEFINE (scm_mkdir, "mkdir", 1, 1, 0,
(SCM path, SCM mode),
"Create a new directory named by @var{path}. If @var{mode} is omitted\n"
"then the permissions of the directory file are set using the current\n"
"umask. Otherwise they are set to the decimal value specified with\n"
"@var{m... | 128331080543585624737822334688372409592 | None | CWE-275 | CVE-2016-8605 | The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.... | https://nvd.nist.gov/vuln/detail/CVE-2016-8605 | |
503,867 | guile | 245608911698adb3472803856019bdd5670b6614 | http://git.savannah.gnu.org/cgit/guile | http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=245608911698adb3472803856019bdd5670b6614 | Remove 'umask' calls from 'mkdir'.
Fixes <http://bugs.gnu.org/24659>.
* libguile/filesys.c (SCM_DEFINE): Remove calls to 'umask' when MODE is
unbound; instead, use 0777 as the mode. Update docstring to clarify
this.
* doc/ref/posix.texi (File System): Adjust accordingly.
* NEWS: Mention it. | 0 | SCM_DEFINE (scm_mkdir, "mkdir", 1, 1, 0,
(SCM path, SCM mode),
"Create a new directory named by @var{path}. If @var{mode} is omitted\n"
"then the permissions of the directory are set to @code{#o777}\n"
"masked with the current umask (@pxref{Processes, @code{umask}}).\n"
"Otherwise they ... | 144536922752412825349714870039112918366 | None | CWE-275 | CVE-2016-8605 | The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.... | https://nvd.nist.gov/vuln/detail/CVE-2016-8605 | |
216,654 | core | 2c3f37672277b1f73f84722802aaa0ab1ab3e413 | https://github.com/LibreOffice/core | https://github.com/dovecot/core/commit/2c3f37672277b1f73f84722802aaa0ab1ab3e413 | auth: Don't crash expanding %variables when username isn't set.
This continues the auth-policy fix in
c3d3faa4f72a676e183f34be960cff13a5a725ae | 1 | auth_request_get_var_expand_table_full(const struct auth_request *auth_request,
auth_request_escape_func_t *escape_func,
unsigned int *count)
{
const unsigned int auth_count =
N_ELEMENTS(auth_request_var_expand_static_tab);
struct var_expand_table *tab, *ret_tab;
const char *orig_user, *auth_... | 262295488878616392807601246569405637828 | None | CWE-20 | CVE-2016-8652 | The auth component in Dovecot before 2.2.27, when auth-policy is configured, allows a remote attackers to cause a denial of service (crash) by aborting authentication without setting a username. | https://nvd.nist.gov/vuln/detail/CVE-2016-8652 | |
503,985 | core | 2c3f37672277b1f73f84722802aaa0ab1ab3e413 | https://github.com/LibreOffice/core | https://github.com/dovecot/core/commit/2c3f37672277b1f73f84722802aaa0ab1ab3e413 | auth: Don't crash expanding %variables when username isn't set.
This continues the auth-policy fix in
c3d3faa4f72a676e183f34be960cff13a5a725ae | 0 | auth_request_get_var_expand_table_full(const struct auth_request *auth_request,
auth_request_escape_func_t *escape_func,
unsigned int *count)
{
const unsigned int auth_count =
N_ELEMENTS(auth_request_var_expand_static_tab);
struct var_expand_table *tab, *ret_tab;
const char *orig_user, *auth_... | 300800458657154811271321575901169213921 | None | CWE-20 | CVE-2016-8652 | The auth component in Dovecot before 2.2.27, when auth-policy is configured, allows a remote attackers to cause a denial of service (crash) by aborting authentication without setting a username. | https://nvd.nist.gov/vuln/detail/CVE-2016-8652 | |
216,701 | libtiff | dc02f9050311a90b3c0655147cee09bfa7081cfc | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/dc02f9050311a90b3c0655147cee09bfa7081cfc | * libtiff/tif_read.c: add protection against excessive memory
allocation attempts in TIFFReadDirEntryArray() on short files.
Effective for mmap'ed case. And non-mmap'ed case, but restricted
to 64bit builds.
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2675 | 1 | static enum TIFFReadDirEntryErr TIFFReadDirEntryArrayWithLimit(
TIFF* tif, TIFFDirEntry* direntry, uint32* count, uint32 desttypesize,
void** value, uint64 maxcount)
{
int typesize;
uint32 datasize;
void* data;
uint64 target_count64;
typesize=TIFFDataWidth(direntry->tdir_type);
target_count... | 251386727160240066128978497337284996796 | None | CWE-770 | CVE-2017-12944 | The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation. | https://nvd.nist.gov/vuln/detail/CVE-2017-12944 | |
504,608 | libtiff | dc02f9050311a90b3c0655147cee09bfa7081cfc | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/dc02f9050311a90b3c0655147cee09bfa7081cfc | * libtiff/tif_read.c: add protection against excessive memory
allocation attempts in TIFFReadDirEntryArray() on short files.
Effective for mmap'ed case. And non-mmap'ed case, but restricted
to 64bit builds.
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2675 | 0 | static enum TIFFReadDirEntryErr TIFFReadDirEntryArrayWithLimit(
TIFF* tif, TIFFDirEntry* direntry, uint32* count, uint32 desttypesize,
void** value, uint64 maxcount)
{
int typesize;
uint32 datasize;
void* data;
uint64 target_count64;
typesize=TIFFDataWidth(direntry->tdir_type);
target_count... | 283163990857495325814682097643200308064 | None | CWE-770 | CVE-2017-12944 | The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation. | https://nvd.nist.gov/vuln/detail/CVE-2017-12944 | |
216,726 | openssl | f426625b6ae9a7831010750490a5f0ad689c5ba3 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f426625b6ae9a7831010750490a5f0ad689c5ba3 | Prevent over long nonces in ChaCha20-Poly1305
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for
every encryption operation. RFC 7539 specifies that the nonce value (IV)
should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and
front pads the nonce with 0 bytes if it is less than... | 1 | static int chacha20_poly1305_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg,
void *ptr)
{
EVP_CHACHA_AEAD_CTX *actx = aead_data(ctx);
switch(type) {
case EVP_CTRL_INIT:
if (actx == NULL)
actx = ctx->cipher_data
= OPENSSL_zalloc(sizeof(*act... | 82290393614199201513765816848927157706 | None | CWE-327 | CVE-2019-1543 | ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a... | https://nvd.nist.gov/vuln/detail/CVE-2019-1543 | |
505,463 | openssl | f426625b6ae9a7831010750490a5f0ad689c5ba3 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f426625b6ae9a7831010750490a5f0ad689c5ba3 | Prevent over long nonces in ChaCha20-Poly1305
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for
every encryption operation. RFC 7539 specifies that the nonce value (IV)
should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and
front pads the nonce with 0 bytes if it is less than... | 0 | static int chacha20_poly1305_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg,
void *ptr)
{
EVP_CHACHA_AEAD_CTX *actx = aead_data(ctx);
switch(type) {
case EVP_CTRL_INIT:
if (actx == NULL)
actx = ctx->cipher_data
= OPENSSL_zalloc(sizeof(*act... | 319328437340198657902119470811531700376 | None | CWE-327 | CVE-2019-1543 | ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a... | https://nvd.nist.gov/vuln/detail/CVE-2019-1543 | |
216,800 | core | 69ad3c902ea4bbf9f21ab1857d8923f975dc6145 | https://github.com/LibreOffice/core | https://github.com/dovecot/core/commit/69ad3c902ea4bbf9f21ab1857d8923f975dc6145 | auth: mech-rpa - Fail on zero len buffer | 1 | rpa_read_buffer(pool_t pool, const unsigned char **data,
const unsigned char *end, unsigned char **buffer)
{
const unsigned char *p = *data;
unsigned int len;
if (p > end)
return 0;
len = *p++;
if (p + len > end)
return 0;
*buffer = p_malloc(pool, len);
memcpy(*buffer, p, len);
*data += 1 + len;
ret... | 29472874834578262075169131407750507339 | None | CWE-125 | CVE-2020-12674 | In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2020-12674 | |
506,428 | core | 69ad3c902ea4bbf9f21ab1857d8923f975dc6145 | https://github.com/LibreOffice/core | https://github.com/dovecot/core/commit/69ad3c902ea4bbf9f21ab1857d8923f975dc6145 | auth: mech-rpa - Fail on zero len buffer | 0 | rpa_read_buffer(pool_t pool, const unsigned char **data,
const unsigned char *end, unsigned char **buffer)
{
const unsigned char *p = *data;
unsigned int len;
if (p > end)
return 0;
len = *p++;
if (p + len > end || len == 0)
return 0;
*buffer = p_malloc(pool, len);
memcpy(*buffer, p, len);
*data += 1 ... | 42033596058129329438262094419912462932 | None | CWE-125 | CVE-2020-12674 | In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2020-12674 | |
216,861 | openssl | 94d23fcff9b2a7a8368dfe52214d5c2569882c11 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/94d23fcff9b2a7a8368dfe52214d5c2569882c11 | Fix EC_GROUP_new_from_ecparameters to check the base length
Check that there's at least one byte in params->base before trying to
read it.
CVE-2021-3712
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org> | 1 | EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
{
int ok = 0, tmp;
EC_GROUP *ret = NULL, *dup = NULL;
BIGNUM *p = NULL, *a = NULL, *b = NULL;
EC_POINT *point = NULL;
long field_bits;
int curve_name = NID_undef;
BN_CTX *ctx = NULL;
if (!params->fieldID || !params->fi... | 80540639516178112864890741931948685257 | None | CWE-125 | CVE-2021-3712 | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str... | https://nvd.nist.gov/vuln/detail/CVE-2021-3712 | |
507,778 | openssl | 94d23fcff9b2a7a8368dfe52214d5c2569882c11 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/94d23fcff9b2a7a8368dfe52214d5c2569882c11 | Fix EC_GROUP_new_from_ecparameters to check the base length
Check that there's at least one byte in params->base before trying to
read it.
CVE-2021-3712
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org> | 0 | EC_GROUP *EC_GROUP_new_from_ecparameters(const ECPARAMETERS *params)
{
int ok = 0, tmp;
EC_GROUP *ret = NULL, *dup = NULL;
BIGNUM *p = NULL, *a = NULL, *b = NULL;
EC_POINT *point = NULL;
long field_bits;
int curve_name = NID_undef;
BN_CTX *ctx = NULL;
if (!params->fieldID || !params->fi... | 230738893451780669362858497865794698672 | None | CWE-125 | CVE-2021-3712 | ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a str... | https://nvd.nist.gov/vuln/detail/CVE-2021-3712 | |
216,903 | server | 3a52569499e2f0c4d1f25db1e81617a9d9755400 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/3a52569499e2f0c4d1f25db1e81617a9d9755400 | MDEV-25636: Bug report: abortion in sql/sql_parse.cc:6294
The asserion failure was caused by this query
select /*id=1*/ from t1
where
col= ( select /*id=2*/ from ... where corr_cond1
union
select /*id=4*/ from ... where corr_cond2)
Here,
- select with id=2 was correlated due to corr_cond1.... | 1 | bool st_select_lex::optimize_unflattened_subqueries(bool const_only)
{
SELECT_LEX_UNIT *next_unit= NULL;
for (SELECT_LEX_UNIT *un= first_inner_unit();
un;
un= next_unit ? next_unit : un->next_unit())
{
Item_subselect *subquery_predicate= un->item;
next_unit= NULL;
if (subquery_predicate... | 170977446789514176182113064369700449502 | None | CWE-476 | CVE-2021-46664 | MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr. | https://nvd.nist.gov/vuln/detail/CVE-2021-46664 | |
508,874 | server | 3a52569499e2f0c4d1f25db1e81617a9d9755400 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/3a52569499e2f0c4d1f25db1e81617a9d9755400 | MDEV-25636: Bug report: abortion in sql/sql_parse.cc:6294
The asserion failure was caused by this query
select /*id=1*/ from t1
where
col= ( select /*id=2*/ from ... where corr_cond1
union
select /*id=4*/ from ... where corr_cond2)
Here,
- select with id=2 was correlated due to corr_cond1.... | 0 | bool st_select_lex::optimize_unflattened_subqueries(bool const_only)
{
SELECT_LEX_UNIT *next_unit= NULL;
for (SELECT_LEX_UNIT *un= first_inner_unit();
un;
un= next_unit ? next_unit : un->next_unit())
{
Item_subselect *subquery_predicate= un->item;
next_unit= NULL;
if (subquery_predicate... | 335655854636733648424487878771712666992 | None | CWE-476 | CVE-2021-46664 | MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr. | https://nvd.nist.gov/vuln/detail/CVE-2021-46664 | |
216,945 | server | 807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order...
When doing condition pushdown from HAVING into WHERE,
Item_equal::create_pushable_equalities() calls
item->set_extraction_flag(IMMUTABLE_FL) for constant items.
Then, Item::cleanup_excluding_immutables_processor() checks for this flag
to see ... | 1 | bool Item_equal::create_pushable_equalities(THD *thd,
List<Item> *equalities,
Pushdown_checker checker,
uchar *arg,
bool clone_const)
{
Item *... | 310506936609045112273577090786370872524 | None | CWE-617 | CVE-2022-27382 | MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order. | https://nvd.nist.gov/vuln/detail/CVE-2022-27382 | |
512,825 | server | 807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order...
When doing condition pushdown from HAVING into WHERE,
Item_equal::create_pushable_equalities() calls
item->set_extraction_flag(IMMUTABLE_FL) for constant items.
Then, Item::cleanup_excluding_immutables_processor() checks for this flag
to see ... | 0 | bool Item_equal::create_pushable_equalities(THD *thd,
List<Item> *equalities,
Pushdown_checker checker,
uchar *arg,
bool clone_const)
{
Item *... | 247600252359942672774915786547473250797 | None | CWE-617 | CVE-2022-27382 | MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order. | https://nvd.nist.gov/vuln/detail/CVE-2022-27382 | |
216,946 | server | c05fd700970ad45735caed3a6f9930d4ce19a3bd | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/c05fd700970ad45735caed3a6f9930d4ce19a3bd | MDEV-26323 use-after-poison issue of MariaDB server | 1 | static void fix_dl_name(MEM_ROOT *root, LEX_STRING *dl)
{
const size_t so_ext_len= sizeof(SO_EXT) - 1;
if (my_strcasecmp(&my_charset_latin1, dl->str + dl->length - so_ext_len,
SO_EXT))
{
char *s= (char*)alloc_root(root, dl->length + so_ext_len + 1);
memcpy(s, dl->str, dl->length);
... | 339917125862392009139749816960654857347 | None | CWE-416 | CVE-2022-27383 | MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. | https://nvd.nist.gov/vuln/detail/CVE-2022-27383 | |
513,202 | server | c05fd700970ad45735caed3a6f9930d4ce19a3bd | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/c05fd700970ad45735caed3a6f9930d4ce19a3bd | MDEV-26323 use-after-poison issue of MariaDB server | 0 | static void fix_dl_name(MEM_ROOT *root, LEX_STRING *dl)
{
const size_t so_ext_len= sizeof(SO_EXT) - 1;
if (dl->length < so_ext_len ||
my_strcasecmp(&my_charset_latin1, dl->str + dl->length - so_ext_len,
SO_EXT))
{
char *s= (char*)alloc_root(root, dl->length + so_ext_len + 1);
mem... | 98463444639733543200591125506342217809 | None | CWE-416 | CVE-2022-27383 | MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. | https://nvd.nist.gov/vuln/detail/CVE-2022-27383 | |
216,965 | server | ecb6f9c894d3ebafeff1c6eb3b65cd248062296f | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/ecb6f9c894d3ebafeff1c6eb3b65cd248062296f | MDEV-28095 crash in multi-update and implicit grouping
disallow implicit grouping in multi-update.
explicit GROUP BY is not allowed by the grammar. | 1 | multi_update::initialize_tables(JOIN *join)
{
TABLE_LIST *table_ref;
DBUG_ENTER("initialize_tables");
if (unlikely((thd->variables.option_bits & OPTION_SAFE_UPDATES) &&
error_if_full_join(join)))
DBUG_RETURN(1);
main_table=join->join_tab->table;
table_to_update= 0;
/* Any update has at ... | 133589877756276645137859301197732446596 | None | CWE-617 | CVE-2022-27448 | There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc. | https://nvd.nist.gov/vuln/detail/CVE-2022-27448 | |
514,292 | server | ecb6f9c894d3ebafeff1c6eb3b65cd248062296f | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/ecb6f9c894d3ebafeff1c6eb3b65cd248062296f | MDEV-28095 crash in multi-update and implicit grouping
disallow implicit grouping in multi-update.
explicit GROUP BY is not allowed by the grammar. | 0 | multi_update::initialize_tables(JOIN *join)
{
TABLE_LIST *table_ref;
DBUG_ENTER("initialize_tables");
if (unlikely((thd->variables.option_bits & OPTION_SAFE_UPDATES) &&
error_if_full_join(join)))
DBUG_RETURN(1);
if (join->implicit_grouping)
{
my_error(ER_INVALID_GROUP_FUNC_USE, MYF(0))... | 64239982738333152415398593981285799300 | None | CWE-617 | CVE-2022-27448 | There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc. | https://nvd.nist.gov/vuln/detail/CVE-2022-27448 | |
217,176 | monit | 328f60773057641c4b2075fab9820145e95b728c | https://bitbucket.org/tildeslash/monit | https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c | Fixed: HTML escape the log file content when viewed via Monit GUI. | 1 | static void do_viewlog(HttpRequest req, HttpResponse res) {
if (is_readonly(req)) {
send_error(req, res, SC_FORBIDDEN, "You do not have sufficient privileges to access this page");
return;
}
do_head(res, "_viewlog", "View log", 100);
if ((Run.flags & Run_L... | 11066915327345888296428446172682700897 | None | CWE-79 | CVE-2019-11454 | Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation. | https://nvd.nist.gov/vuln/detail/CVE-2019-11454 | |
517,437 | monit | 328f60773057641c4b2075fab9820145e95b728c | https://bitbucket.org/tildeslash/monit | https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c | Fixed: HTML escape the log file content when viewed via Monit GUI. | 0 | static void do_viewlog(HttpRequest req, HttpResponse res) {
if (is_readonly(req)) {
send_error(req, res, SC_FORBIDDEN, "You do not have sufficient privileges to access this page");
return;
}
do_head(res, "_viewlog", "View log", 100);
if ((Run.flags & Run_L... | 289779635859944473579386698211739203129 | None | CWE-79 | CVE-2019-11454 | Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation. | https://nvd.nist.gov/vuln/detail/CVE-2019-11454 | |
217,551 | elfspirit | c5b0f5a9a24f2451bbeda4751d67633bc375e608 | https://github.com/liyansong2018/elfspirit | https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608 | Fix #1 about out-of-bounds | 1 | int parse(char *elf) {
int fd;
struct stat st;
uint8_t *elf_map;
int count;
char *tmp;
char *name;
char flag[4];
MODE = get_elf_class(elf);
fd = open(elf, O_RDONLY);
if (fd < 0) {
perror("open");
return -1;
}
if (fstat(fd, &st) < 0) {
perror("fs... | 10492118832219739041814229234332696880 | None | CWE-125 | CVE-2022-21711 | elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21711 | |
522,438 | elfspirit | c5b0f5a9a24f2451bbeda4751d67633bc375e608 | https://github.com/liyansong2018/elfspirit | https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608 | Fix #1 about out-of-bounds | 0 | int parse(char *elf) {
int fd;
struct stat st;
uint8_t *elf_map;
int count;
char *tmp;
char *name;
char flag[4];
MODE = get_elf_class(elf);
fd = open(elf, O_RDONLY);
if (fd < 0) {
perror("open");
return -1;
}
if (fstat(fd, &st) < 0) {
perror("fs... | 212625338852409612714470845997465821390 | None | CWE-125 | CVE-2022-21711 | elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21711 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.