idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash string | file_name string | file_hash string | cwe string | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
204,115 | openldap | 3539fc33212b528c56b716584f2c2994af7c30b0 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 | ITS#9454 fix issuerAndThisUpdateCheck | 1 | issuerAndThisUpdateCheck(
struct berval *in,
struct berval *is,
struct berval *tu,
void *ctx )
{
int numdquotes = 0;
struct berval x = *in;
struct berval ni = BER_BVNULL;
/* Parse GSER format */
enum {
HAVE_NONE = 0x0,
HAVE_ISSUER = 0x1,
HAVE_THISUPDATE = 0x2,
HAVE_ALL = ( HAVE_ISSUER | HAVE_THISUPDAT... | 320953270427993363171410441809926002124 | schema_init.c | 177224706623297221858931327325567866275 | CWE-617 | CVE-2021-27212 | In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime. | https://nvd.nist.gov/vuln/detail/CVE-2021-27212 |
353,015 | openldap | 3539fc33212b528c56b716584f2c2994af7c30b0 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 | ITS#9454 fix issuerAndThisUpdateCheck | 0 | issuerAndThisUpdateCheck(
struct berval *in,
struct berval *is,
struct berval *tu,
void *ctx )
{
int numdquotes = 0;
struct berval x = *in;
struct berval ni = BER_BVNULL;
/* Parse GSER format */
enum {
HAVE_NONE = 0x0,
HAVE_ISSUER = 0x1,
HAVE_THISUPDATE = 0x2,
HAVE_ALL = ( HAVE_ISSUER | HAVE_THISUPDAT... | 298149048073642841250394521193700631288 | schema_init.c | 127214091536244192150172242805699646468 | CWE-617 | CVE-2021-27212 | In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime. | https://nvd.nist.gov/vuln/detail/CVE-2021-27212 |
204,243 | vim | fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d | https://github.com/vim/vim | https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d | patch 8.2.4206: condition with many "(" causes a crash
Problem: Condition with many "(" causes a crash.
Solution: Limit recursion to 1000. | 1 | eval7(
char_u **arg,
typval_T *rettv,
evalarg_T *evalarg,
int want_string) // after "." operator
{
int evaluate = evalarg != NULL
&& (evalarg->eval_flags & EVAL_EVALUATE);
int len;
char_u *s;
char_u *name_start = NULL;
char_u *start_leader, *end_leader;
int ret = OK... | 36727009233023880586835574908835910206 | eval.c | 215532001349875821306945607465028796767 | CWE-787 | CVE-2022-0351 | Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0351 |
355,649 | vim | fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d | https://github.com/vim/vim | https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d | patch 8.2.4206: condition with many "(" causes a crash
Problem: Condition with many "(" causes a crash.
Solution: Limit recursion to 1000. | 0 | eval7(
char_u **arg,
typval_T *rettv,
evalarg_T *evalarg,
int want_string) // after "." operator
{
int evaluate = evalarg != NULL
&& (evalarg->eval_flags & EVAL_EVALUATE);
int len;
char_u *s;
char_u *name_start = NULL;
char_u *start_leader, *end_leader;
int ret = OK... | 324139368658301016034800923930937563014 | eval.c | 208824404078014502397565483410500490043 | CWE-787 | CVE-2022-0351 | Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0351 |
204,351 | squirrel | 23a0620658714b996d20da3d4dd1a0dcf9b0bd98 | https://github.com/albertodemichelis/squirrel | https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98 | check max member count in class | 1 | bool SQClass::NewSlot(SQSharedState *ss,const SQObjectPtr &key,const SQObjectPtr &val,bool bstatic)
{
SQObjectPtr temp;
bool belongs_to_static_table = sq_type(val) == OT_CLOSURE || sq_type(val) == OT_NATIVECLOSURE || bstatic;
if(_locked && !belongs_to_static_table)
return false; //the class already ... | 269872855469648419079058130898644045027 | sqclass.cpp | 75131817582394814638781750834830258905 | CWE-125 | CVE-2021-41556 | sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an out-of-bounds read (in the core interpreter) that can lead to Code Execution. If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality s... | https://nvd.nist.gov/vuln/detail/CVE-2021-41556 |
357,668 | squirrel | 23a0620658714b996d20da3d4dd1a0dcf9b0bd98 | https://github.com/albertodemichelis/squirrel | https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98 | check max member count in class | 0 | bool SQClass::NewSlot(SQSharedState *ss,const SQObjectPtr &key,const SQObjectPtr &val,bool bstatic)
{
SQObjectPtr temp;
bool belongs_to_static_table = sq_type(val) == OT_CLOSURE || sq_type(val) == OT_NATIVECLOSURE || bstatic;
if(_locked && !belongs_to_static_table)
return false; //the class already ... | 114176109037888032181151333197990654093 | sqclass.cpp | 129356662613675265537572681929065618991 | CWE-125 | CVE-2021-41556 | sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an out-of-bounds read (in the core interpreter) that can lead to Code Execution. If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality s... | https://nvd.nist.gov/vuln/detail/CVE-2021-41556 |
204,412 | bpf | 4b81ccebaeee885ab1aa1438133f2991e3a2b6ea | https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf | https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea | bpf, ringbuf: Deny reserve of buffers larger than ringbuf
A BPF program might try to reserve a buffer larger than the ringbuf size.
If the consumer pointer is way ahead of the producer, that would be
successfully reserved, allowing the BPF program to read or write out of
the ringbuf allocated area.
Reported-by: Ryota... | 1 | static void *__bpf_ringbuf_reserve(struct bpf_ringbuf *rb, u64 size)
{
unsigned long cons_pos, prod_pos, new_prod_pos, flags;
u32 len, pg_off;
struct bpf_ringbuf_hdr *hdr;
if (unlikely(size > RINGBUF_MAX_RECORD_SZ))
return NULL;
len = round_up(size + BPF_RINGBUF_HDR_SZ, 8);
cons_pos = smp_load_acquire(&rb->co... | 305878074800514937766892583405358065403 | ringbuf.c | 6876939472683174674440151046802738508 | CWE-787 | CVE-2021-3489 | The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny r... | https://nvd.nist.gov/vuln/detail/CVE-2021-3489 |
359,206 | bpf | 4b81ccebaeee885ab1aa1438133f2991e3a2b6ea | https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf | https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea | bpf, ringbuf: Deny reserve of buffers larger than ringbuf
A BPF program might try to reserve a buffer larger than the ringbuf size.
If the consumer pointer is way ahead of the producer, that would be
successfully reserved, allowing the BPF program to read or write out of
the ringbuf allocated area.
Reported-by: Ryota... | 0 | static void *__bpf_ringbuf_reserve(struct bpf_ringbuf *rb, u64 size)
{
unsigned long cons_pos, prod_pos, new_prod_pos, flags;
u32 len, pg_off;
struct bpf_ringbuf_hdr *hdr;
if (unlikely(size > RINGBUF_MAX_RECORD_SZ))
return NULL;
len = round_up(size + BPF_RINGBUF_HDR_SZ, 8);
if (len > rb->mask + 1)
return NU... | 233821322614692863219886146117009832812 | ringbuf.c | 3063228527898556498340075998394929987 | CWE-787 | CVE-2021-3489 | The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny r... | https://nvd.nist.gov/vuln/detail/CVE-2021-3489 |
204,425 | frr | 6d58272b4cf96f0daa846210dd2104877900f921 | https://github.com/FRRouting/frr | https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921 | [bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not a... | 1 | bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
{
u_char *end;
struct capability cap;
u_char action;
struct bgp *bgp;
afi_t afi;
safi_t safi;
bgp = peer->bgp;
end = pnt + length;
while (pnt < end)
{
/* We need at least action, capability code and capability len... | 158680384884701932457641345037828096002 | bgp_packet.c | 16679227999356180294013513559974077753 | CWE-125 | CVE-2022-37032 | An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-37032 |
359,365 | frr | 6d58272b4cf96f0daa846210dd2104877900f921 | https://github.com/FRRouting/frr | https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921 | [bgpd] cleanup, compact and consolidate capability parsing code
2007-07-26 Paul Jakma <paul.jakma@sun.com>
* (general) Clean up and compact capability parsing slightly.
Consolidate validation of length and logging of generic TLV, and
memcpy of capability data, thus removing such from cap specifc
code (not a... | 0 | bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
{
u_char *end;
struct capability_mp_data mpc;
struct capability_header *hdr;
u_char action;
struct bgp *bgp;
afi_t afi;
safi_t safi;
bgp = peer->bgp;
end = pnt + length;
while (pnt < end)
{
/* We need at l... | 222322579110596507029051344758915923400 | bgp_packet.c | 203634856057323248974002745421549823051 | CWE-125 | CVE-2022-37032 | An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-37032 |
204,534 | admesh | e84d8353f1347e1f26f0a95770d92ba14e6ede38 | https://github.com/admesh/admesh | https://github.com/admesh/admesh/commit/e84d8353f1347e1f26f0a95770d92ba14e6ede38 | Fix heap buffer overflow in stl_update_connects_remove_1
- Add argument value check to the stl_update_connects_remove_1
- Add neighbor value check in stl_remove_degenerate
Fixes https://github.com/admesh/admesh/issues/28
Merges https://github.com/admesh/admesh/pull/55 | 1 | stl_remove_degenerate(stl_file *stl, int facet) {
int edge1;
int edge2;
int edge3;
int neighbor1;
int neighbor2;
int neighbor3;
int vnot1;
int vnot2;
int vnot3;
if (stl->error) return;
if( !memcmp(&stl->facet_start[facet].vertex[0],
&stl->facet_start[facet].vertex[1], sizeof(st... | 62749783590026466291303120848549680020 | connect.c | 88334157411234536587499947341326463538 | CWE-125 | CVE-2018-25033 | ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-25033 |
361,303 | admesh | e84d8353f1347e1f26f0a95770d92ba14e6ede38 | https://github.com/admesh/admesh | https://github.com/admesh/admesh/commit/e84d8353f1347e1f26f0a95770d92ba14e6ede38 | Fix heap buffer overflow in stl_update_connects_remove_1
- Add argument value check to the stl_update_connects_remove_1
- Add neighbor value check in stl_remove_degenerate
Fixes https://github.com/admesh/admesh/issues/28
Merges https://github.com/admesh/admesh/pull/55 | 0 | stl_remove_degenerate(stl_file *stl, int facet) {
int edge1;
int edge2;
int edge3;
int neighbor1;
int neighbor2;
int neighbor3;
int vnot1;
int vnot2;
int vnot3;
if (stl->error) return;
if( !memcmp(&stl->facet_start[facet].vertex[0],
&stl->facet_start[facet].vertex[1], sizeof(st... | 25155049141523797391201320731237896996 | connect.c | 216745481854892780790975730037335372174 | CWE-125 | CVE-2018-25033 | ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-25033 |
205,823 | ovs | 803ed12e31b0377c37d7aa8c94b3b92f2081e349 | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | ipf: release unhandled packets from the batch
Since 640d4db788ed ("ipf: Fix a use-after-free error, ...") the ipf
framework unconditionally allocates a new dp_packet to track
individual fragments. This prevents a use-after-free. However, an
additional issue was present - even when the packet buffer is cloned,
if the... | 1 | ipf_extract_frags_from_batch(struct ipf *ipf, struct dp_packet_batch *pb,
ovs_be16 dl_type, uint16_t zone, long long now,
uint32_t hash_basis)
{
const size_t pb_cnt = dp_packet_batch_size(pb);
int pb_idx; /* Index in a packet batch. */
struct dp_pack... | 268719993787134993398351954055334505161 | ipf.c | 8691777507480014794600271586586377411 | CWE-401 | CVE-2021-3905 | A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. | https://nvd.nist.gov/vuln/detail/CVE-2021-3905 |
373,535 | ovs | 803ed12e31b0377c37d7aa8c94b3b92f2081e349 | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | ipf: release unhandled packets from the batch
Since 640d4db788ed ("ipf: Fix a use-after-free error, ...") the ipf
framework unconditionally allocates a new dp_packet to track
individual fragments. This prevents a use-after-free. However, an
additional issue was present - even when the packet buffer is cloned,
if the... | 0 | ipf_extract_frags_from_batch(struct ipf *ipf, struct dp_packet_batch *pb,
ovs_be16 dl_type, uint16_t zone, long long now,
uint32_t hash_basis)
{
const size_t pb_cnt = dp_packet_batch_size(pb);
int pb_idx; /* Index in a packet batch. */
struct dp_pack... | 120994420466199339145680136614353279460 | ipf.c | 251424754321869382912198899459965953031 | CWE-401 | CVE-2021-3905 | A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. | https://nvd.nist.gov/vuln/detail/CVE-2021-3905 |
206,043 | gimp | c57f9dcf1934a9ab0cd67650f2dea18cb0902270 | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=c57f9dcf1934a9ab0cd67650f2dea18cb0902270 | Bug 790784 - (CVE-2017-17784) heap overread in gbr parser / load_image.
We were assuming the input name was well formed, hence was
nul-terminated. As any data coming from external input, this has to be
thorougly checked.
Similar to commit 06d24a79af94837d615d0024916bb95a01bf3c59 but adapted
to older gimp-2-8 code. | 1 | load_image (const gchar *filename,
GError **error)
{
gchar *name;
gint fd;
BrushHeader bh;
guchar *brush_buf = NULL;
gint32 image_ID;
gint32 layer_ID;
GimpParasite *parasite;
GimpDrawable *drawable;
GimpPix... | 219487381392289910094593757172224969152 | file-gbr.c | 210537502330856952427982223109888523462 | CWE-125 | CVE-2017-17784 | In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data. | https://nvd.nist.gov/vuln/detail/CVE-2017-17784 |
376,678 | gimp | c57f9dcf1934a9ab0cd67650f2dea18cb0902270 | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=c57f9dcf1934a9ab0cd67650f2dea18cb0902270 | Bug 790784 - (CVE-2017-17784) heap overread in gbr parser / load_image.
We were assuming the input name was well formed, hence was
nul-terminated. As any data coming from external input, this has to be
thorougly checked.
Similar to commit 06d24a79af94837d615d0024916bb95a01bf3c59 but adapted
to older gimp-2-8 code. | 0 | load_image (const gchar *filename,
GError **error)
{
gchar *name;
gint fd;
BrushHeader bh;
guchar *brush_buf = NULL;
gint32 image_ID;
gint32 layer_ID;
GimpParasite *parasite;
GimpDrawable *drawable;
GimpPix... | 269327823766609487068724383051357537961 | file-gbr.c | 146644042188037261041231342134151379601 | CWE-125 | CVE-2017-17784 | In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data. | https://nvd.nist.gov/vuln/detail/CVE-2017-17784 |
206,262 | vim | c6fdb15d423df22e1776844811d082322475e48a | https://github.com/vim/vim | https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a | patch 9.0.0025: accessing beyond allocated memory with the cmdline window
Problem: Accessing beyond allocated memory when using the cmdline window in
Ex mode.
Solution: Use "*" instead of "'<,'>" for Visual mode. | 1 | parse_command_modifiers(
exarg_T *eap,
char **errormsg,
cmdmod_T *cmod,
int skip_only)
{
char_u *orig_cmd = eap->cmd;
char_u *cmd_start = NULL;
int use_plus_cmd = FALSE;
int starts_with_colon = FALSE;
int vim9script = in_vim9script();
int has_visual_range = F... | 61928994098668347793112269457604758897 | ex_docmd.c | 287878878694425028301990758845576774946 | CWE-787 | CVE-2022-2288 | Out-of-bounds Write in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2288 |
379,334 | vim | c6fdb15d423df22e1776844811d082322475e48a | https://github.com/vim/vim | https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a | patch 9.0.0025: accessing beyond allocated memory with the cmdline window
Problem: Accessing beyond allocated memory when using the cmdline window in
Ex mode.
Solution: Use "*" instead of "'<,'>" for Visual mode. | 0 | parse_command_modifiers(
exarg_T *eap,
char **errormsg,
cmdmod_T *cmod,
int skip_only)
{
char_u *orig_cmd = eap->cmd;
char_u *cmd_start = NULL;
int use_plus_cmd = FALSE;
int starts_with_colon = FALSE;
int vim9script = in_vim9script();
int has_visual_range = F... | 128847198820720658441664267481456465295 | ex_docmd.c | 80050062526332961104670632599823980115 | CWE-787 | CVE-2022-2288 | Out-of-bounds Write in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2288 |
206,555 | php-src | cc08cbc84d46933c1e9e0149633f1ed5d19e45e9 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=cc08cbc84d46933c1e9e0149633f1ed5d19e45e9 | Fix #73280: Stack Buffer Overflow in GD dynamicGetbuf
We make sure to never pass a negative `rlen` as size to memcpy().
Cf. <https://github.com/libgd/libgd/commit/53110871>. | 1 | static int dynamicGetbuf (gdIOCtxPtr ctx, void *buf, int len)
{
int rlen, remain;
dpIOCtxPtr dctx;
dynamicPtr *dp;
dctx = (dpIOCtxPtr) ctx;
dp = dctx->dp;
remain = dp->logicalSize - dp->pos;
if (remain >= len) {
rlen = len;
} else {
if (remain == 0) {
return EOF;
}
rlen = remain;
}
memcpy(buf, (... | 44554623121680820346289655905713695377 | gd_io_dp.c | 66950500877592745162628589676156559345 | CWE-119 | CVE-2016-8670 | Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagec... | https://nvd.nist.gov/vuln/detail/CVE-2016-8670 |
382,797 | php-src | cc08cbc84d46933c1e9e0149633f1ed5d19e45e9 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=cc08cbc84d46933c1e9e0149633f1ed5d19e45e9 | Fix #73280: Stack Buffer Overflow in GD dynamicGetbuf
We make sure to never pass a negative `rlen` as size to memcpy().
Cf. <https://github.com/libgd/libgd/commit/53110871>. | 0 | static int dynamicGetbuf (gdIOCtxPtr ctx, void *buf, int len)
{
int rlen, remain;
dpIOCtxPtr dctx;
dynamicPtr *dp;
dctx = (dpIOCtxPtr) ctx;
dp = dctx->dp;
remain = dp->logicalSize - dp->pos;
if (remain >= len) {
rlen = len;
} else {
if (remain <= 0) {
return EOF;
}
rlen = remain;
}
memcpy(buf, (... | 227798178939410399739015256330671261805 | gd_io_dp.c | 171487762597506665250744911889099357441 | CWE-119 | CVE-2016-8670 | Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagec... | https://nvd.nist.gov/vuln/detail/CVE-2016-8670 |
206,588 | php-src | feba44546c27b0158f9ac20e72040a224b918c75 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=feba44546c27b0158f9ac20e72040a224b918c75 | Fixed bug #22965 (Crash in gd lib's ImageFillToBorder()). | 1 | gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color)
{
int lastBorder;
/* Seek left */
int leftLimit, rightLimit;
int i;
leftLimit = (-1);
if (border < 0)
{
/* Refuse to fill to a non-solid border */
return;
}
for (i = x; (i >= 0); i--)
{
if (gdImageGetPix... | 198226344899217828573742271884272950799 | None | CWE-119 | CVE-2015-8874 | Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call. | https://nvd.nist.gov/vuln/detail/CVE-2015-8874 | |
383,316 | php-src | feba44546c27b0158f9ac20e72040a224b918c75 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=feba44546c27b0158f9ac20e72040a224b918c75 | Fixed bug #22965 (Crash in gd lib's ImageFillToBorder()). | 0 | void gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color)
{
int lastBorder;
/* Seek left */
int leftLimit = -1, rightLimit;
int i;
if (border < 0) {
/* Refuse to fill to a non-solid border */
return;
}
if (x >= im->sx) {
x = im->sx - 1;
}
if (y >= im->sy) {
y = im->sy - 1;
}
fo... | 4519916874419069747672345142292777613 | None | CWE-119 | CVE-2015-8874 | Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call. | https://nvd.nist.gov/vuln/detail/CVE-2015-8874 | |
206,639 | linux | e02f0d3970404bfea385b6edb86f2d936db0ea2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e02f0d3970404bfea385b6edb86f2d936db0ea2b | netfilter: nf_tables: disallow binding to already bound chain
Update nft_data_init() to report EINVAL if chain is already bound.
Fixes: d0e2c7de92c7 ("netfilter: nf_tables: add NFT_CHAIN_BINDING")
Reported-by: Gwangun Jung <exsociety@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> | 1 | static int nft_verdict_init(const struct nft_ctx *ctx, struct nft_data *data,
struct nft_data_desc *desc, const struct nlattr *nla)
{
u8 genmask = nft_genmask_next(ctx->net);
struct nlattr *tb[NFTA_VERDICT_MAX + 1];
struct nft_chain *chain;
int err;
err = nla_parse_nested_deprecated(tb, NFTA_VERDICT_MAX, n... | 76294390154807140346030498178733770308 | nf_tables_api.c | 280373467088228575441623327249382307245 | CWE-703 | CVE-2022-39190 | An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. | https://nvd.nist.gov/vuln/detail/CVE-2022-39190 |
384,201 | linux | e02f0d3970404bfea385b6edb86f2d936db0ea2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e02f0d3970404bfea385b6edb86f2d936db0ea2b | netfilter: nf_tables: disallow binding to already bound chain
Update nft_data_init() to report EINVAL if chain is already bound.
Fixes: d0e2c7de92c7 ("netfilter: nf_tables: add NFT_CHAIN_BINDING")
Reported-by: Gwangun Jung <exsociety@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> | 0 | static int nft_verdict_init(const struct nft_ctx *ctx, struct nft_data *data,
struct nft_data_desc *desc, const struct nlattr *nla)
{
u8 genmask = nft_genmask_next(ctx->net);
struct nlattr *tb[NFTA_VERDICT_MAX + 1];
struct nft_chain *chain;
int err;
err = nla_parse_nested_deprecated(tb, NFTA_VERDICT_MAX, n... | 189225679685979204194302814541477257663 | nf_tables_api.c | 161585463478410786724773068235961577198 | CWE-703 | CVE-2022-39190 | An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. | https://nvd.nist.gov/vuln/detail/CVE-2022-39190 |
206,670 | nbdkit | 6c5faac6a37077cf2366388a80862bb00616d0d8 | https://github.com/libguestfs/nbdkit | https://gitlab.com/nbdkit/nbdkit/-/commit/6c5faac6a37077cf2366388a80862bb00616d0d8 | server: reset meta context replies on starttls
Related to CVE-2021-3716, but not as severe. No compliant client will
send NBD_CMD_BLOCK_STATUS unless it first negotiates
NBD_OPT_SET_META_CONTEXT. If an attacker injects a premature
SET_META_CONTEXT, either the client will never notice (because it
never uses BLOCK_STA... | 1 | negotiate_handshake_newstyle_options (void)
{
GET_CONN;
struct nbd_new_option new_option;
size_t nr_options;
bool list_seen = false;
uint64_t version;
uint32_t option;
uint32_t optlen;
struct nbd_export_name_option_reply handshake_finish;
const char *optname;
uint64_t exportsize;
struct backend *b... | 230092713719482299459555478858076762309 | protocol-handshake-newstyle.c | 263209595426945567952192628081217546469 | CWE-924 | CVE-2021-3716 | A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. T... | https://nvd.nist.gov/vuln/detail/CVE-2021-3716 |
384,677 | nbdkit | 6c5faac6a37077cf2366388a80862bb00616d0d8 | https://github.com/libguestfs/nbdkit | https://gitlab.com/nbdkit/nbdkit/-/commit/6c5faac6a37077cf2366388a80862bb00616d0d8 | server: reset meta context replies on starttls
Related to CVE-2021-3716, but not as severe. No compliant client will
send NBD_CMD_BLOCK_STATUS unless it first negotiates
NBD_OPT_SET_META_CONTEXT. If an attacker injects a premature
SET_META_CONTEXT, either the client will never notice (because it
never uses BLOCK_STA... | 0 | negotiate_handshake_newstyle_options (void)
{
GET_CONN;
struct nbd_new_option new_option;
size_t nr_options;
bool list_seen = false;
uint64_t version;
uint32_t option;
uint32_t optlen;
struct nbd_export_name_option_reply handshake_finish;
const char *optname;
uint64_t exportsize;
struct backend *b... | 13793654971535202622888110493636437287 | protocol-handshake-newstyle.c | 210643238405506282504328455056206224474 | CWE-924 | CVE-2021-3716 | A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. T... | https://nvd.nist.gov/vuln/detail/CVE-2021-3716 |
206,676 | vim | 777e7c21b7627be80961848ac560cb0a9978ff43 | https://github.com/vim/vim | https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 | patch 8.2.3564: invalid memory access when scrolling without valid screen
Problem: Invalid memory access when scrolling without a valid screen.
Solution: Do not set VALID_BOTLINE in w_valid. | 1 | update_topline(void)
{
long line_count;
int halfheight;
int n;
linenr_T old_topline;
#ifdef FEAT_DIFF
int old_topfill;
#endif
#ifdef FEAT_FOLDING
linenr_T lnum;
#endif
int check_topline = FALSE;
int check_botline = FALSE;
long *so_ptr = curwin->w_p_so >= 0 ? &curwin->w_p_... | 228543629723963000813717359055705778977 | move.c | 235877722919937919149866597040080656666 | CWE-122 | CVE-2021-3903 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2021-3903 |
384,767 | vim | 777e7c21b7627be80961848ac560cb0a9978ff43 | https://github.com/vim/vim | https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 | patch 8.2.3564: invalid memory access when scrolling without valid screen
Problem: Invalid memory access when scrolling without a valid screen.
Solution: Do not set VALID_BOTLINE in w_valid. | 0 | update_topline(void)
{
long line_count;
int halfheight;
int n;
linenr_T old_topline;
#ifdef FEAT_DIFF
int old_topfill;
#endif
#ifdef FEAT_FOLDING
linenr_T lnum;
#endif
int check_topline = FALSE;
int check_botline = FALSE;
long *so_ptr = curwin->w_p_so >= 0 ? &curwin->w_p_... | 318695242827135485367008238388311307871 | move.c | 216110417083492209479100354226379064539 | CWE-122 | CVE-2021-3903 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2021-3903 |
206,677 | vim | 5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 | patch 8.2.4418: crash when using special multi-byte character
Problem: Crash when using special multi-byte character.
Solution: Don't use isalpha() for an arbitrary character. | 1 | unix_expandpath(
garray_T *gap,
char_u *path,
int wildoff,
int flags, // EW_* flags
int didstar) // expanded "**" once already
{
char_u *buf;
char_u *path_end;
char_u *p, *s, *e;
int start_len = gap->ga_len;
char_u *pat;
regmatch_T regmatch;
int starts_with_dot;
... | 312674114892145176500352390912517515307 | filepath.c | 229066241137802797352238773426978474827 | CWE-703 | CVE-2022-0685 | Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418. | https://nvd.nist.gov/vuln/detail/CVE-2022-0685 |
384,803 | vim | 5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87 | patch 8.2.4418: crash when using special multi-byte character
Problem: Crash when using special multi-byte character.
Solution: Don't use isalpha() for an arbitrary character. | 0 | unix_expandpath(
garray_T *gap,
char_u *path,
int wildoff,
int flags, // EW_* flags
int didstar) // expanded "**" once already
{
char_u *buf;
char_u *path_end;
char_u *p, *s, *e;
int start_len = gap->ga_len;
char_u *pat;
regmatch_T regmatch;
int starts_with_dot;
... | 314207374277767272342244288300260252688 | filepath.c | 268435853121240029622170757643385181583 | CWE-703 | CVE-2022-0685 | Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418. | https://nvd.nist.gov/vuln/detail/CVE-2022-0685 |
207,150 | squirrel | a6413aa690e0bdfef648c68693349a7b878fe60d | https://github.com/albertodemichelis/squirrel | https://github.com/albertodemichelis/squirrel/commit/a6413aa690e0bdfef648c68693349a7b878fe60d | fix in thread.call | 1 | static SQInteger thread_call(HSQUIRRELVM v)
{
SQObjectPtr o = stack_get(v,1);
if(sq_type(o) == OT_THREAD) {
SQInteger nparams = sq_gettop(v);
_thread(o)->Push(_thread(o)->_roottable);
for(SQInteger i = 2; i<(nparams+1); i++)
sq_move(_thread(o),v,i);
if(SQ_SUCCEEDED(sq... | 39783972208477930534182111058478291044 | sqbaselib.cpp | 22214130882110251892898581176850711195 | CWE-703 | CVE-2022-30292 | Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call. | https://nvd.nist.gov/vuln/detail/CVE-2022-30292 |
393,528 | squirrel | a6413aa690e0bdfef648c68693349a7b878fe60d | https://github.com/albertodemichelis/squirrel | https://github.com/albertodemichelis/squirrel/commit/a6413aa690e0bdfef648c68693349a7b878fe60d | fix in thread.call | 0 | static SQInteger thread_call(HSQUIRRELVM v)
{
SQObjectPtr o = stack_get(v,1);
if(sq_type(o) == OT_THREAD) {
SQInteger nparams = sq_gettop(v);
sq_reservestack(_thread(o), nparams + 3);
_thread(o)->Push(_thread(o)->_roottable);
for(SQInteger i = 2; i<(nparams+1); i++)
s... | 185870701968227218426869749475686341047 | sqbaselib.cpp | 167918424394936848193603192917033144376 | CWE-703 | CVE-2022-30292 | Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call. | https://nvd.nist.gov/vuln/detail/CVE-2022-30292 |
207,461 | autotrace | e96bffadc25ff0ba0e10745f8012efcc5f920ea9 | https://github.com/autotrace/autotrace | https://github.com/autotrace/autotrace/commit/e96bffadc25ff0ba0e10745f8012efcc5f920ea9 | input-bmp: Increase header buffer in some cases
Signed-off-by: Peter Lemenkov <lemenkov@gmail.com> | 1 | at_bitmap input_bmp_reader(gchar * filename, at_input_opts_type * opts, at_msg_func msg_func, gpointer msg_data, gpointer user_data)
{
FILE *fd;
unsigned char buffer[64];
int ColormapSize, rowbytes, Maps;
gboolean Grey = FALSE;
unsigned char ColorMap[256][3];
at_bitmap image = at_bitmap_init(0, 0, 0, 1);
... | 217805098145205715295086602544452101199 | input-bmp.c | 38605146891124325135879659140059354528 | CWE-787 | CVE-2022-32323 | AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660. | https://nvd.nist.gov/vuln/detail/CVE-2022-32323 |
397,644 | autotrace | e96bffadc25ff0ba0e10745f8012efcc5f920ea9 | https://github.com/autotrace/autotrace | https://github.com/autotrace/autotrace/commit/e96bffadc25ff0ba0e10745f8012efcc5f920ea9 | input-bmp: Increase header buffer in some cases
Signed-off-by: Peter Lemenkov <lemenkov@gmail.com> | 0 | at_bitmap input_bmp_reader(gchar * filename, at_input_opts_type * opts, at_msg_func msg_func, gpointer msg_data, gpointer user_data)
{
FILE *fd;
unsigned char buffer[128];
int ColormapSize, rowbytes, Maps;
gboolean Grey = FALSE;
unsigned char ColorMap[256][3];
at_bitmap image = at_bitmap_init(0, 0, 0, 1);
... | 18153038985911000449594893666433988306 | input-bmp.c | 29852375577809733693857999744439179756 | CWE-787 | CVE-2022-32323 | AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660. | https://nvd.nist.gov/vuln/detail/CVE-2022-32323 |
207,520 | rizin | aa6917772d2f32e5a7daab25a46c72df0b5ea406 | https://github.com/rizinorg/rizin | https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406 | Fix oob write for dwarf with abbrev with count 0 (Fix #2083) (#2086) | 1 | static const ut8 *parse_die(const ut8 *buf, const ut8 *buf_end, RzBinDwarfDebugInfo *info, RzBinDwarfAbbrevDecl *abbrev,
RzBinDwarfCompUnitHdr *hdr, RzBinDwarfDie *die, const ut8 *debug_str, size_t debug_str_len, bool big_endian) {
size_t i;
const char *comp_dir = NULL;
ut64 line_info_offset = UT64_MAX;
for (i = 0... | 26636529307671690704479532140631853142 | dwarf.c | 327051726619513035208543664099881519843 | CWE-787 | CVE-2021-43814 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute u... | https://nvd.nist.gov/vuln/detail/CVE-2021-43814 |
398,518 | rizin | aa6917772d2f32e5a7daab25a46c72df0b5ea406 | https://github.com/rizinorg/rizin | https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406 | Fix oob write for dwarf with abbrev with count 0 (Fix #2083) (#2086) | 0 | static const ut8 *parse_die(const ut8 *buf, const ut8 *buf_end, RzBinDwarfDebugInfo *info, RzBinDwarfAbbrevDecl *abbrev,
RzBinDwarfCompUnitHdr *hdr, RzBinDwarfDie *die, const ut8 *debug_str, size_t debug_str_len, bool big_endian) {
size_t i;
const char *comp_dir = NULL;
ut64 line_info_offset = UT64_MAX;
if (abbrev... | 51977580595649091612975538237343950990 | dwarf.c | 92035029709372705681125485016113687180 | CWE-787 | CVE-2021-43814 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute u... | https://nvd.nist.gov/vuln/detail/CVE-2021-43814 |
207,700 | EternalTerminal | 900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | https://github.com/MisterTea/EternalTerminal | https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | red fixes (#468)
* red fixes
* remove magic number | 1 | TerminalUserInfo UserTerminalRouter::getInfoForId(const string &id) {
auto it = idInfoMap.find(id);
if (it == idInfoMap.end()) {
STFATAL << " Tried to read from an id that no longer exists";
}
return it->second;
} | 65652485071667159611859578809507103310 | UserTerminalRouter.cpp | 95512591738948248593704083286692164926 | CWE-362 | CVE-2022-24950 | A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId(). | https://nvd.nist.gov/vuln/detail/CVE-2022-24950 |
400,109 | EternalTerminal | 900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | https://github.com/MisterTea/EternalTerminal | https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | red fixes (#468)
* red fixes
* remove magic number | 0 | TerminalUserInfo UserTerminalRouter::getInfoForId(const string &id) {
lock_guard<recursive_mutex> guard(routerMutex);
auto it = idInfoMap.find(id);
if (it == idInfoMap.end()) {
STFATAL << " Tried to read from an id that no longer exists";
}
return it->second;
} | 194538535842091525230611933768280108618 | UserTerminalRouter.cpp | 33756077495418666193931642880316711781 | CWE-362 | CVE-2022-24950 | A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId(). | https://nvd.nist.gov/vuln/detail/CVE-2022-24950 |
207,703 | EternalTerminal | 900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | https://github.com/MisterTea/EternalTerminal | https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | red fixes (#468)
* red fixes
* remove magic number | 1 | set<int> PipeSocketHandler::listen(const SocketEndpoint& endpoint) {
lock_guard<std::recursive_mutex> guard(globalMutex);
string pipePath = endpoint.name();
if (pipeServerSockets.find(pipePath) != pipeServerSockets.end()) {
throw runtime_error("Tried to listen twice on the same path");
}
sockaddr_un loc... | 148534117660985776148799839801292812152 | PipeSocketHandler.cpp | 83158573064577402992437694952965778259 | CWE-362 | CVE-2022-24950 | A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId(). | https://nvd.nist.gov/vuln/detail/CVE-2022-24950 |
400,103 | EternalTerminal | 900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | https://github.com/MisterTea/EternalTerminal | https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3 | red fixes (#468)
* red fixes
* remove magic number | 0 | set<int> PipeSocketHandler::listen(const SocketEndpoint& endpoint) {
lock_guard<std::recursive_mutex> guard(globalMutex);
string pipePath = endpoint.name();
if (pipeServerSockets.find(pipePath) != pipeServerSockets.end()) {
throw runtime_error("Tried to listen twice on the same path");
}
sockaddr_un loc... | 36125659257824603505725557266857282888 | PipeSocketHandler.cpp | 231978839420872719355627255082595640778 | CWE-362 | CVE-2022-24950 | A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId(). | https://nvd.nist.gov/vuln/detail/CVE-2022-24950 |
207,719 | vim | e98c88c44c308edaea5994b8ad4363e65030968c | https://github.com/vim/vim | https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c | patch 9.0.0218: reading before the start of the line
Problem: Reading before the start of the line.
Solution: When displaying "$" check the column is not negative. | 1 | display_dollar(colnr_T col)
{
colnr_T save_col;
if (!redrawing())
return;
cursor_off();
save_col = curwin->w_cursor.col;
curwin->w_cursor.col = col;
if (has_mbyte)
{
char_u *p;
// If on the last byte of a multi-byte move to the first byte.
p = ml_get_curline();
curwin->w_cursor.col -... | 56781688432244503822784219524894149055 | edit.c | 251788010034679613424556948955874474953 | CWE-787 | CVE-2022-2845 | Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218. | https://nvd.nist.gov/vuln/detail/CVE-2022-2845 |
400,409 | vim | e98c88c44c308edaea5994b8ad4363e65030968c | https://github.com/vim/vim | https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c | patch 9.0.0218: reading before the start of the line
Problem: Reading before the start of the line.
Solution: When displaying "$" check the column is not negative. | 0 | display_dollar(colnr_T col_arg)
{
colnr_T col = col_arg < 0 ? 0 : col_arg;
colnr_T save_col;
if (!redrawing())
return;
cursor_off();
save_col = curwin->w_cursor.col;
curwin->w_cursor.col = col;
if (has_mbyte)
{
char_u *p;
// If on the last byte of a multi-byte move to the first byt... | 125832747032800290670744012264167596321 | edit.c | 91657375912486719968624749742093008286 | CWE-787 | CVE-2022-2845 | Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218. | https://nvd.nist.gov/vuln/detail/CVE-2022-2845 |
207,753 | linux | 9d2231c5d74e13b2a0546fee6737ee4446017903 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9d2231c5d74e13b2a0546fee6737ee4446017903 | lib/iov_iter: initialize "flags" in new pipe_buffer
The functions copy_page_to_iter_pipe() and push_pipe() can both
allocate a new pipe_buffer, but the "flags" member initializer is
missing.
Fixes: 241699cd72a8 ("new iov_iter flavour: pipe-backed")
To: Alexander Viro <viro@zeniv.linux.org.uk>
To: linux-fsdevel@vger.k... | 1 | static size_t copy_page_to_iter_pipe(struct page *page, size_t offset, size_t bytes,
struct iov_iter *i)
{
struct pipe_inode_info *pipe = i->pipe;
struct pipe_buffer *buf;
unsigned int p_tail = pipe->tail;
unsigned int p_mask = pipe->ring_size - 1;
unsigned int i_head = i->head;
size_t off;
if (unlikely(byt... | 167718514506109094299086513897213873936 | iov_iter.c | 181499146794090302160100800341530380411 | CWE-284 | CVE-2022-0847 | A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read o... | https://nvd.nist.gov/vuln/detail/CVE-2022-0847 |
400,735 | linux | 9d2231c5d74e13b2a0546fee6737ee4446017903 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9d2231c5d74e13b2a0546fee6737ee4446017903 | lib/iov_iter: initialize "flags" in new pipe_buffer
The functions copy_page_to_iter_pipe() and push_pipe() can both
allocate a new pipe_buffer, but the "flags" member initializer is
missing.
Fixes: 241699cd72a8 ("new iov_iter flavour: pipe-backed")
To: Alexander Viro <viro@zeniv.linux.org.uk>
To: linux-fsdevel@vger.k... | 0 | static size_t copy_page_to_iter_pipe(struct page *page, size_t offset, size_t bytes,
struct iov_iter *i)
{
struct pipe_inode_info *pipe = i->pipe;
struct pipe_buffer *buf;
unsigned int p_tail = pipe->tail;
unsigned int p_mask = pipe->ring_size - 1;
unsigned int i_head = i->head;
size_t off;
if (unlikely(byt... | 254624609360113587487306617570895393083 | iov_iter.c | 158086795761237639591506235503715650431 | CWE-284 | CVE-2022-0847 | A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read o... | https://nvd.nist.gov/vuln/detail/CVE-2022-0847 |
207,780 | radare2 | 2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | Fix oobread in dyldcache ##crash
* Reported by @hdthky via huntr.dev
* Reproducers: poc1
* BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 | 1 | static RList *create_cache_bins(RBinFile *bf, RDyldCache *cache) {
RList *bins = r_list_newf ((RListFree)free_bin);
ut16 *depArray = NULL;
cache_imgxtr_t *extras = NULL;
if (!bins) {
return NULL;
}
char *target_libs = NULL;
RList *target_lib_names = NULL;
int *deps = NULL;
target_libs = r_sys_getenv ("R_DYL... | 174827048480806807337685920262304563052 | None | CWE-703 | CVE-2022-1244 | heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2022-1244 | |
401,034 | radare2 | 2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | Fix oobread in dyldcache ##crash
* Reported by @hdthky via huntr.dev
* Reproducers: poc1
* BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 | 0 | static RList *create_cache_bins(RBinFile *bf, RDyldCache *cache) {
RList *bins = r_list_newf ((RListFree)free_bin);
ut16 *depArray = NULL;
cache_imgxtr_t *extras = NULL;
if (!bins) {
return NULL;
}
char *target_libs = NULL;
RList *target_lib_names = NULL;
int *deps = NULL;
target_libs = r_sys_getenv ("R_DYL... | 125973238096905171890400385176953298313 | None | CWE-703 | CVE-2022-1244 | heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2022-1244 | |
207,990 | pcre2 | 03654e751e7f0700693526b67dfcadda6b42c9d0 | https://github.com/PCRE2Project/pcre2 | https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 | Fixed an issue affecting recursions in JIT | 1 | static int get_recurse_data_length(compiler_common *common, PCRE2_SPTR cc, PCRE2_SPTR ccend,
BOOL *needs_control_head, BOOL *has_quit, BOOL *has_accept)
{
int length = 1;
int size;
PCRE2_SPTR alternative;
BOOL quit_found = FALSE;
BOOL accept_found = FALSE;
BOOL setsom_found = FALSE;
BOOL setmark_found = FALSE;
BOOL c... | 240126232931244050288328890875640372325 | pcre2_jit_compile.c | 105541590302198799083513857874765354258 | CWE-703 | CVE-2022-1587 | An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers. | https://nvd.nist.gov/vuln/detail/CVE-2022-1587 |
404,192 | pcre2 | 03654e751e7f0700693526b67dfcadda6b42c9d0 | https://github.com/PCRE2Project/pcre2 | https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 | Fixed an issue affecting recursions in JIT | 0 | static int get_recurse_data_length(compiler_common *common, PCRE2_SPTR cc, PCRE2_SPTR ccend,
BOOL *needs_control_head, BOOL *has_quit, BOOL *has_accept)
{
int length = 1;
int size, offset;
PCRE2_SPTR alternative;
BOOL quit_found = FALSE;
BOOL accept_found = FALSE;
BOOL setsom_found = FALSE;
BOOL setmark_found = FALSE... | 173942933444712771516446324481674462692 | pcre2_jit_compile.c | 52374969195278947710795935639555031915 | CWE-703 | CVE-2022-1587 | An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers. | https://nvd.nist.gov/vuln/detail/CVE-2022-1587 |
208,107 | linux | f85daf0e725358be78dfd208dea5fd665d8cb901 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901 | xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
xfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of
pols[0]. This refcount can be dropped in xfrm_expand_policies() when
xfrm_expand_policies() return error. pols[0]'s refcount is balanced in
here. But xfrm_bundle_look... | 1 | static int xfrm_expand_policies(const struct flowi *fl, u16 family,
struct xfrm_policy **pols,
int *num_pols, int *num_xfrms)
{
int i;
if (*num_pols == 0 || !pols[0]) {
*num_pols = 0;
*num_xfrms = 0;
return 0;
}
if (IS_ERR(pols[0]))
return PTR_ERR(pols[0]);
*num_xfrms = pols[0]->xfrm_nr;
#ifdef ... | 251684023315514826982518858194996142213 | xfrm_policy.c | 240690312801703995044299112379503581676 | CWE-703 | CVE-2022-36879 | An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice. | https://nvd.nist.gov/vuln/detail/CVE-2022-36879 |
405,333 | linux | f85daf0e725358be78dfd208dea5fd665d8cb901 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901 | xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()
xfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of
pols[0]. This refcount can be dropped in xfrm_expand_policies() when
xfrm_expand_policies() return error. pols[0]'s refcount is balanced in
here. But xfrm_bundle_look... | 0 | static int xfrm_expand_policies(const struct flowi *fl, u16 family,
struct xfrm_policy **pols,
int *num_pols, int *num_xfrms)
{
int i;
if (*num_pols == 0 || !pols[0]) {
*num_pols = 0;
*num_xfrms = 0;
return 0;
}
if (IS_ERR(pols[0])) {
*num_pols = 0;
return PTR_ERR(pols[0]);
}
*num_xfrms = pols... | 29732626654088535700777069321150029090 | xfrm_policy.c | 264724924246430289692801756816591917107 | CWE-703 | CVE-2022-36879 | An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice. | https://nvd.nist.gov/vuln/detail/CVE-2022-36879 |
208,140 | util-linux | 5ebbc3865d1e53ef42e5f121c41faab23dd59075 | https://github.com/karelzak/util-linux | http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=5ebbc3865d1e53ef42e5f121c41faab23dd59075 | mount: sanitize paths from non-root users
$ mount /root/.ssh/../../dev/sda2
mount: only root can mount UUID=17bc65ec-4125-4e7c-8a7d-e2795064c736 on /boot
this is too promiscuous. It seems better to ignore on command line
specified paths which are not resolve-able for non-root users.
Fixed version:
$ mount /root... | 1 | int main(int argc, char **argv)
{
int c, rc = MOUNT_EX_SUCCESS, all = 0, show_labels = 0;
struct libmnt_context *cxt;
struct libmnt_table *fstab = NULL;
char *srcbuf = NULL;
char *types = NULL;
unsigned long oper = 0;
enum {
MOUNT_OPT_SHARED = CHAR_MAX + 1,
MOUNT_OPT_SLAVE,
MOUNT_OPT_PRIVATE,
MOUNT_OPT_... | 219498005792940261578066564094421095366 | mount.c | 324534442685972817552003935079520935664 | CWE-200 | CVE-2013-0157 | (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th... | https://nvd.nist.gov/vuln/detail/CVE-2013-0157 |
406,206 | util-linux | 5ebbc3865d1e53ef42e5f121c41faab23dd59075 | https://github.com/karelzak/util-linux | http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=5ebbc3865d1e53ef42e5f121c41faab23dd59075 | mount: sanitize paths from non-root users
$ mount /root/.ssh/../../dev/sda2
mount: only root can mount UUID=17bc65ec-4125-4e7c-8a7d-e2795064c736 on /boot
this is too promiscuous. It seems better to ignore on command line
specified paths which are not resolve-able for non-root users.
Fixed version:
$ mount /root... | 0 | int main(int argc, char **argv)
{
int c, rc = MOUNT_EX_SUCCESS, all = 0, show_labels = 0;
struct libmnt_context *cxt;
struct libmnt_table *fstab = NULL;
char *srcbuf = NULL;
char *types = NULL;
unsigned long oper = 0;
enum {
MOUNT_OPT_SHARED = CHAR_MAX + 1,
MOUNT_OPT_SLAVE,
MOUNT_OPT_PRIVATE,
MOUNT_OPT_... | 43692452455655783216200177030716124780 | mount.c | 7925930289343170386207247806304317495 | CWE-200 | CVE-2013-0157 | (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th... | https://nvd.nist.gov/vuln/detail/CVE-2013-0157 |
208,411 | vim | 27efc62f5d86afcb2ecb7565587fe8dea4b036fe | https://github.com/vim/vim | https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe | patch 9.0.0018: going over the end of the typahead
Problem: Going over the end of the typahead.
Solution: Put a NUL after the typeahead. | 1 | check_termcode(
int max_offset,
char_u *buf,
int bufsize,
int *buflen)
{
char_u *tp;
char_u *p;
int slen = 0; // init for GCC
int modslen;
int len;
int retval = 0;
int offset;
char_u key_name[2];
int modifiers;
char_u *modifiers_start = NULL;
int key... | 196889976171376146553776878857496634863 | term.c | 255079853890988870585830908048537470004 | CWE-787 | CVE-2022-2285 | Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2285 |
409,515 | vim | 27efc62f5d86afcb2ecb7565587fe8dea4b036fe | https://github.com/vim/vim | https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe | patch 9.0.0018: going over the end of the typahead
Problem: Going over the end of the typahead.
Solution: Put a NUL after the typeahead. | 0 | check_termcode(
int max_offset,
char_u *buf,
int bufsize,
int *buflen)
{
char_u *tp;
char_u *p;
int slen = 0; // init for GCC
int modslen;
int len;
int retval = 0;
int offset;
char_u key_name[2];
int modifiers;
char_u *modifiers_start = NULL;
int key... | 105354748681163651663383549655228844664 | term.c | 113564079834188954277061754674630069521 | CWE-787 | CVE-2022-2285 | Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2285 |
208,522 | unbound | 02080f6b180232f43b77f403d0c038e9360a460f | https://github.com/NLnetLabs/unbound | https://github.com/NLnetLabs/unbound/commit/02080f6b180232f43b77f403d0c038e9360a460f | - Fix Integer Overflows in Size Calculations,
reported by X41 D-Sec. | 1 | dnsc_load_local_data(struct dnsc_env* dnscenv, struct config_file *cfg)
{
size_t i, j;
// Insert 'local-zone: "2.dnscrypt-cert.example.com" deny'
if(!cfg_str2list_insert(&cfg->local_zones,
strdup(dnscenv->provider_name),
strdup("deny"))) {
log_err... | 44451332163685602086826854088983200257 | dnscrypt.c | 338731906376917706393921999097571082291 | CWE-190 | CVE-2019-25038 | Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited | https://nvd.nist.gov/vuln/detail/CVE-2019-25038 |
412,117 | unbound | 02080f6b180232f43b77f403d0c038e9360a460f | https://github.com/NLnetLabs/unbound | https://github.com/NLnetLabs/unbound/commit/02080f6b180232f43b77f403d0c038e9360a460f | - Fix Integer Overflows in Size Calculations,
reported by X41 D-Sec. | 0 | dnsc_load_local_data(struct dnsc_env* dnscenv, struct config_file *cfg)
{
size_t i, j;
// Insert 'local-zone: "2.dnscrypt-cert.example.com" deny'
if(!cfg_str2list_insert(&cfg->local_zones,
strdup(dnscenv->provider_name),
strdup("deny"))) {
log_err... | 220864762997315196932796822660985000469 | dnscrypt.c | 151631660973156645492009635074477412124 | CWE-190 | CVE-2019-25038 | Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited | https://nvd.nist.gov/vuln/detail/CVE-2019-25038 |
208,912 | vim | 1c3dd8ddcba63c1af5112e567215b3cec2de11d0 | https://github.com/vim/vim | https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0 | patch 9.0.0490: using freed memory with cmdwin and BufEnter autocmd
Problem: Using freed memory with cmdwin and BufEnter autocmd.
Solution: Make sure pointer to b_p_iminsert is still valid. | 1 | getcmdline_int(
int firstc,
long count UNUSED, // only used for incremental search
int indent, // indent for inside conditionals
int clear_ccline) // clear ccline first
{
static int depth = 0; // call depth
int c;
int i;
int j;
int gotesc = FALSE; // TRUE when <ESC> just... | 318420655328659351378249069297989245289 | ex_getln.c | 35630205531070235041879855338965504689 | CWE-416 | CVE-2022-3235 | Use After Free in GitHub repository vim/vim prior to 9.0.0490. | https://nvd.nist.gov/vuln/detail/CVE-2022-3235 |
416,366 | vim | 1c3dd8ddcba63c1af5112e567215b3cec2de11d0 | https://github.com/vim/vim | https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0 | patch 9.0.0490: using freed memory with cmdwin and BufEnter autocmd
Problem: Using freed memory with cmdwin and BufEnter autocmd.
Solution: Make sure pointer to b_p_iminsert is still valid. | 0 | getcmdline_int(
int firstc,
long count UNUSED, // only used for incremental search
int indent, // indent for inside conditionals
int clear_ccline) // clear ccline first
{
static int depth = 0; // call depth
int c;
int i;
int j;
int gotesc = FALSE; // TRUE when <ESC> just... | 287277157755538522084742430465983420799 | ex_getln.c | 200105240926561396065075027208565202210 | CWE-416 | CVE-2022-3235 | Use After Free in GitHub repository vim/vim prior to 9.0.0490. | https://nvd.nist.gov/vuln/detail/CVE-2022-3235 |
209,102 | vim | 80525751c5ce9ed82c41d83faf9ef38667bf61b1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1 | patch 9.0.0259: crash with mouse click when not initialized
Problem: Crash with mouse click when not initialized.
Solution: Check TabPageIdxs[] is not NULL. | 1 | do_mouse(
oparg_T *oap, // operator argument, can be NULL
int c, // K_LEFTMOUSE, etc
int dir, // Direction to 'put' if necessary
long count,
int fixindent) // PUT_FIXINDENT if fixing indent necessary
{
static int do_always = FALSE; // ignore 'mouse' setting next time
static int got_cli... | 230981879452824566126490545559038336652 | mouse.c | 48030859742909908779392834945640503907 | CWE-703 | CVE-2022-2980 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259. | https://nvd.nist.gov/vuln/detail/CVE-2022-2980 |
418,795 | vim | 80525751c5ce9ed82c41d83faf9ef38667bf61b1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1 | patch 9.0.0259: crash with mouse click when not initialized
Problem: Crash with mouse click when not initialized.
Solution: Check TabPageIdxs[] is not NULL. | 0 | do_mouse(
oparg_T *oap, // operator argument, can be NULL
int c, // K_LEFTMOUSE, etc
int dir, // Direction to 'put' if necessary
long count,
int fixindent) // PUT_FIXINDENT if fixing indent necessary
{
static int do_always = FALSE; // ignore 'mouse' setting next time
static int got_cli... | 340201685272816729984528939326600503133 | mouse.c | 56805804002879785388836197750941387525 | CWE-703 | CVE-2022-2980 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259. | https://nvd.nist.gov/vuln/detail/CVE-2022-2980 |
209,801 | mujs | f5b3c703e18725e380b83427004632e744f85a6f | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/f5b3c703e18725e380b83427004632e744f85a6f | Issue #161: Cope with empty programs in mujs-pp. | 1 | void jsP_dumpsyntax(js_State *J, js_Ast *prog, int dominify)
{
minify = dominify;
if (prog->type == AST_LIST)
pstmlist(-1, prog);
else {
pstm(0, prog);
nl();
}
if (minify > 1)
putchar('\n');
} | 236329653693817075818818411816465624514 | jsdump.c | 195852189272926394340196020756121895406 | CWE-476 | CVE-2022-30975 | In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp. | https://nvd.nist.gov/vuln/detail/CVE-2022-30975 |
421,378 | mujs | f5b3c703e18725e380b83427004632e744f85a6f | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/f5b3c703e18725e380b83427004632e744f85a6f | Issue #161: Cope with empty programs in mujs-pp. | 0 | void jsP_dumpsyntax(js_State *J, js_Ast *prog, int dominify)
{
minify = dominify;
if (prog) {
if (prog->type == AST_LIST)
pstmlist(-1, prog);
else {
pstm(0, prog);
nl();
}
}
if (minify > 1)
putchar('\n');
} | 148093103302179844815401983905255483216 | jsdump.c | 205390724250782891362749099686890673449 | CWE-476 | CVE-2022-30975 | In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp. | https://nvd.nist.gov/vuln/detail/CVE-2022-30975 |
209,955 | linux | 8188a18ee2e48c9a7461139838048363bfce3fef | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8188a18ee2e48c9a7461139838048363bfce3fef | iwlwifi: pcie: fix rb_allocator workqueue allocation
We don't handle failures in the rb_allocator workqueue allocation
correctly. To fix that, move the code earlier so the cleanup is
easier and we don't have to undo all the interrupt allocations in
this case.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Sig... | 1 | struct iwl_trans *iwl_trans_pcie_alloc(struct pci_dev *pdev,
const struct pci_device_id *ent,
const struct iwl_cfg_trans_params *cfg_trans)
{
struct iwl_trans_pcie *trans_pcie;
struct iwl_trans *trans;
int ret, addr_size;
ret = pcim_enable_device(pdev);
if (ret)
return ERR_PTR(ret);
if (cf... | 68049028566925957329669846026640837120 | trans.c | 121825087774406788902524077810084378083 | CWE-476 | CVE-2019-16234 | drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2019-16234 |
424,969 | linux | 8188a18ee2e48c9a7461139838048363bfce3fef | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8188a18ee2e48c9a7461139838048363bfce3fef | iwlwifi: pcie: fix rb_allocator workqueue allocation
We don't handle failures in the rb_allocator workqueue allocation
correctly. To fix that, move the code earlier so the cleanup is
easier and we don't have to undo all the interrupt allocations in
this case.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Sig... | 0 | struct iwl_trans *iwl_trans_pcie_alloc(struct pci_dev *pdev,
const struct pci_device_id *ent,
const struct iwl_cfg_trans_params *cfg_trans)
{
struct iwl_trans_pcie *trans_pcie;
struct iwl_trans *trans;
int ret, addr_size;
ret = pcim_enable_device(pdev);
if (ret)
return ERR_PTR(ret);
if (cf... | 249581055441914689136534991194413858839 | trans.c | 283396566562106139376150241807074258656 | CWE-476 | CVE-2019-16234 | drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2019-16234 |
210,050 | lua | 1f3c6f4534c6411313361697d98d1145a1f030fa | https://github.com/lua/lua | https://github.com/lua/lua/commit/1f3c6f4534c6411313361697d98d1145a1f030fa | Bug: Lua can generate wrong code when _ENV is <const> | 1 | static void singlevar (LexState *ls, expdesc *var) {
TString *varname = str_checkname(ls);
FuncState *fs = ls->fs;
singlevaraux(fs, varname, var, 1);
if (var->k == VVOID) { /* global name? */
expdesc key;
singlevaraux(fs, ls->envn, var, 1); /* get environment variable */
lua_assert(var->k != VVOID... | 123763961511591581850775011069550713659 | lparser.c | 295868068220261782570461856132388295005 | CWE-125 | CVE-2022-28805 | singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code. | https://nvd.nist.gov/vuln/detail/CVE-2022-28805 |
427,153 | lua | 1f3c6f4534c6411313361697d98d1145a1f030fa | https://github.com/lua/lua | https://github.com/lua/lua/commit/1f3c6f4534c6411313361697d98d1145a1f030fa | Bug: Lua can generate wrong code when _ENV is <const> | 0 | static void singlevar (LexState *ls, expdesc *var) {
TString *varname = str_checkname(ls);
FuncState *fs = ls->fs;
singlevaraux(fs, varname, var, 1);
if (var->k == VVOID) { /* global name? */
expdesc key;
singlevaraux(fs, ls->envn, var, 1); /* get environment variable */
lua_assert(var->k != VVOID... | 86104642186066137571814828089067244595 | lparser.c | 131633022139792411216417604545990891123 | CWE-125 | CVE-2022-28805 | singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code. | https://nvd.nist.gov/vuln/detail/CVE-2022-28805 |
210,204 | linux | cefa91b2332d7009bc0be5d951d6cbbf349f90f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cefa91b2332d7009bc0be5d951d6cbbf349f90f8 | openvswitch: fix OOB access in reserve_sfa_size()
Given a sufficiently large number of actions, while copying and
reserving memory for a new action of a new flow, if next_offset is
greater than MAX_ACTIONS_BUFSIZE, the function reserve_sfa_size() does
not return -EMSGSIZE as expected, but it allocates MAX_ACTIONS_BUFS... | 1 | static struct nlattr *reserve_sfa_size(struct sw_flow_actions **sfa,
int attr_len, bool log)
{
struct sw_flow_actions *acts;
int new_acts_size;
size_t req_size = NLA_ALIGN(attr_len);
int next_offset = offsetof(struct sw_flow_actions, actions) +
(*sfa)->actions_len;
if (req_size <= (ksize(*sfa) - ... | 66009891447134933026284929915758254537 | flow_netlink.c | 47337588811900760055139247291202023489 | CWE-362 | CVE-2022-2639 | An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw al... | https://nvd.nist.gov/vuln/detail/CVE-2022-2639 |
430,380 | linux | cefa91b2332d7009bc0be5d951d6cbbf349f90f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cefa91b2332d7009bc0be5d951d6cbbf349f90f8 | openvswitch: fix OOB access in reserve_sfa_size()
Given a sufficiently large number of actions, while copying and
reserving memory for a new action of a new flow, if next_offset is
greater than MAX_ACTIONS_BUFSIZE, the function reserve_sfa_size() does
not return -EMSGSIZE as expected, but it allocates MAX_ACTIONS_BUFS... | 0 | static struct nlattr *reserve_sfa_size(struct sw_flow_actions **sfa,
int attr_len, bool log)
{
struct sw_flow_actions *acts;
int new_acts_size;
size_t req_size = NLA_ALIGN(attr_len);
int next_offset = offsetof(struct sw_flow_actions, actions) +
(*sfa)->actions_len;
if (req_size <= (ksize(*sfa) - ... | 241955732354437165048790183048012619919 | flow_netlink.c | 169733194668607707184956779941409309704 | CWE-362 | CVE-2022-2639 | An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw al... | https://nvd.nist.gov/vuln/detail/CVE-2022-2639 |
210,206 | squid | 780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b | Improve handling of Gopher responses (#1022) | 1 | gopherToHTML(GopherStateData * gopherState, char *inbuf, int len)
{
char *pos = inbuf;
char *lpos = NULL;
char *tline = NULL;
LOCAL_ARRAY(char, line, TEMP_BUF_SIZE);
LOCAL_ARRAY(char, tmpbuf, TEMP_BUF_SIZE);
char *name = NULL;
char *selector = NULL;
char *host = NULL;
char *port = NU... | 69907744519047196773632287126924030666 | gopher.cc | 274206304991379198598012995880144954128 | CWE-400 | CVE-2021-46784 | In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses. | https://nvd.nist.gov/vuln/detail/CVE-2021-46784 |
430,470 | squid | 780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b | Improve handling of Gopher responses (#1022) | 0 | gopherToHTML(GopherStateData * gopherState, char *inbuf, int len)
{
char *pos = inbuf;
char *lpos = NULL;
char *tline = NULL;
LOCAL_ARRAY(char, line, TEMP_BUF_SIZE);
char *name = NULL;
char *selector = NULL;
char *host = NULL;
char *port = NULL;
char *escaped_selector = NULL;
con... | 138686742216343389129906256835749429816 | gopher.cc | 39955176817113992488945748005868573997 | CWE-400 | CVE-2021-46784 | In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses. | https://nvd.nist.gov/vuln/detail/CVE-2021-46784 |
210,271 | vim | 6669de1b235843968e88844ca6d3c8dec4b01a9e | https://github.com/vim/vim | https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e | patch 9.0.0240: crash when using ":mkspell" with an empty .dic file
Problem: Crash when using ":mkspell" with an empty .dic file.
Solution: Check for an empty word tree. | 1 | sug_filltree(spellinfo_T *spin, slang_T *slang)
{
char_u *byts;
idx_T *idxs;
int depth;
idx_T arridx[MAXWLEN];
int curi[MAXWLEN];
char_u tword[MAXWLEN];
char_u tsalword[MAXWLEN];
int c;
idx_T n;
unsigned words_done = 0;
int wordcount[MAXWLEN];
// We use si_foldroot f... | 207388436213910008407743050781298909937 | spellfile.c | 273224760850620955394187294241739462394 | CWE-787 | CVE-2022-2923 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240. | https://nvd.nist.gov/vuln/detail/CVE-2022-2923 |
432,093 | vim | 6669de1b235843968e88844ca6d3c8dec4b01a9e | https://github.com/vim/vim | https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e | patch 9.0.0240: crash when using ":mkspell" with an empty .dic file
Problem: Crash when using ":mkspell" with an empty .dic file.
Solution: Check for an empty word tree. | 0 | sug_filltree(spellinfo_T *spin, slang_T *slang)
{
char_u *byts;
idx_T *idxs;
int depth;
idx_T arridx[MAXWLEN];
int curi[MAXWLEN];
char_u tword[MAXWLEN];
char_u tsalword[MAXWLEN];
int c;
idx_T n;
unsigned words_done = 0;
int wordcount[MAXWLEN];
// We use si_foldroot f... | 208510972034693515698183125739179180871 | spellfile.c | 159233725116993104212150761027929059833 | CWE-787 | CVE-2022-2923 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240. | https://nvd.nist.gov/vuln/detail/CVE-2022-2923 |
210,273 | mongo | f3604b901d688c194de5e430c7fbab060c9dc8e0 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/f3604b901d688c194de5e430c7fbab060c9dc8e0 | SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards | 1 | createRandomCursorExecutor(const CollectionPtr& coll,
const boost::intrusive_ptr<ExpressionContext>& expCtx,
long long sampleSize,
long long numRecords,
boost::optional<BucketUnpacker> bucketUnpacker) {
Opera... | 239583334467362355681176105432769486304 | pipeline_d.cpp | 58061396446339864036845237439152201402 | CWE-617 | CVE-2021-32037 | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e... | https://nvd.nist.gov/vuln/detail/CVE-2021-32037 |
432,152 | mongo | f3604b901d688c194de5e430c7fbab060c9dc8e0 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/f3604b901d688c194de5e430c7fbab060c9dc8e0 | SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards | 0 | createRandomCursorExecutor(const CollectionPtr& coll,
const boost::intrusive_ptr<ExpressionContext>& expCtx,
long long sampleSize,
long long numRecords,
boost::optional<BucketUnpacker> bucketUnpacker) {
Opera... | 248936200771856096728172359306392383142 | pipeline_d.cpp | 250256559163646850106921369320994189676 | CWE-617 | CVE-2021-32037 | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e... | https://nvd.nist.gov/vuln/detail/CVE-2021-32037 |
210,282 | qemu | b05b267840515730dbf6753495d5b7bd8b04ad1c | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c | i2c-ddc: fix oob read
Suggested-by: Michael Hanselmann <public@hansmi.ch>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Michael Hanselmann <public@hansmi.ch>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190108102301.1957-1-kraxel@redhat.com | 1 | static int i2c_ddc_rx(I2CSlave *i2c)
{
I2CDDCState *s = I2CDDC(i2c);
int value;
value = s->edid_blob[s->reg];
s->reg++;
return value;
} | 231715994309117248387350691536475330701 | i2c-ddc.c | 48804313309392962475337802621299781910 | CWE-125 | CVE-2019-3812 | QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host. | https://nvd.nist.gov/vuln/detail/CVE-2019-3812 |
432,346 | qemu | b05b267840515730dbf6753495d5b7bd8b04ad1c | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c | i2c-ddc: fix oob read
Suggested-by: Michael Hanselmann <public@hansmi.ch>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Michael Hanselmann <public@hansmi.ch>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190108102301.1957-1-kraxel@redhat.com | 0 | static int i2c_ddc_rx(I2CSlave *i2c)
{
I2CDDCState *s = I2CDDC(i2c);
int value;
value = s->edid_blob[s->reg % sizeof(s->edid_blob)];
s->reg++;
return value;
} | 197849623050732713088444316780408422340 | i2c-ddc.c | 241703496436230749148573739318246335373 | CWE-125 | CVE-2019-3812 | QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host. | https://nvd.nist.gov/vuln/detail/CVE-2019-3812 |
210,453 | ghostpdl | 366ad48d076c1aa4c8f83c65011258a04e348207 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=366ad48d076c1aa4c8f83c65011258a04e348207 | Bug 701815: avoid uninitialised bytes being >7, which broke indexing.
Fixes:
./sanbin/gs -dBATCH -dNOPAUSE -sOutputFile=tmp -sDEVICE=jetp3852 ../bug-701815.pdf | 1 | jetp3852_print_page(gx_device_printer *pdev, gp_file *prn_stream)
{
#define DATA_SIZE (LINE_SIZE * 8)
unsigned int cnt_2prn;
unsigned int count,tempcnt;
unsigned char vtp,cntc1,cntc2;
int line_size_color_plane;
byte data[DATA_SIZE];
byte plane_data[LINE_SIZE * 3];
/* Set initial condition... | 93148813029453334596229816591999204427 | gdev3852.c | 229444063869235911698513683887059150132 | CWE-120 | CVE-2020-16302 | A buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16302 |
435,409 | ghostpdl | 366ad48d076c1aa4c8f83c65011258a04e348207 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=366ad48d076c1aa4c8f83c65011258a04e348207 | Bug 701815: avoid uninitialised bytes being >7, which broke indexing.
Fixes:
./sanbin/gs -dBATCH -dNOPAUSE -sOutputFile=tmp -sDEVICE=jetp3852 ../bug-701815.pdf | 0 | jetp3852_print_page(gx_device_printer *pdev, gp_file *prn_stream)
{
#define DATA_SIZE (LINE_SIZE * 8)
unsigned int cnt_2prn;
unsigned int count,tempcnt;
unsigned char vtp,cntc1,cntc2;
int line_size_color_plane;
byte data[DATA_SIZE];
byte plane_data[LINE_SIZE * 3];
/* Initialise data to ze... | 85965008618432429994990471615914575554 | gdev3852.c | 93770144039043531856386464739578824717 | CWE-120 | CVE-2020-16302 | A buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16302 |
210,551 | oniguruma | 4d461376bd85e7994835677b2ff453a43c49cd28 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/4d461376bd85e7994835677b2ff453a43c49cd28 | don't expand string case folds to alternatives if code length == 1 and byte length is same | 1 | expand_case_fold_string(Node* node, regex_t* reg)
{
#define THRESHOLD_CASE_FOLD_ALT_FOR_EXPANSION 8
int r, n, len, alt_num;
UChar *start, *end, *p;
Node *top_root, *root, *snode, *prev_node;
OnigCaseFoldCodeItem items[ONIGENC_GET_CASE_FOLD_CODES_MAX_NUM];
StrNode* sn = STR_(node);
if (NODE_STRING_IS_AMBI... | 183402285676240178400514858197717953400 | regcomp.c | 30592731921158278474590718116243340454 | CWE-125 | CVE-2019-19246 | Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-19246 |
437,291 | oniguruma | 4d461376bd85e7994835677b2ff453a43c49cd28 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/4d461376bd85e7994835677b2ff453a43c49cd28 | don't expand string case folds to alternatives if code length == 1 and byte length is same | 0 | expand_case_fold_string(Node* node, regex_t* reg)
{
#define THRESHOLD_CASE_FOLD_ALT_FOR_EXPANSION 8
int r, n, len, alt_num;
int is_ambig, fold_len;
UChar *start, *end, *p;
UChar* foldp;
Node *top_root, *root, *snode, *prev_node;
OnigCaseFoldCodeItem items[ONIGENC_GET_CASE_FOLD_CODES_MAX_NUM];
UChar buf[... | 98258741045227921109976574238500358148 | regcomp.c | 65059023969392718812527129333061905098 | CWE-125 | CVE-2019-19246 | Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-19246 |
210,570 | radare2 | d4ce40b516ffd70cf2e9e36832d8de139117d522 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 | Fix oobread in symbols header parsing ##bin | 1 | static RCoreSymCacheElement *parseDragons(RBinFile *bf, RBuffer *buf, int off, int bits, R_OWN char *file_name) {
D eprintf ("Dragons at 0x%x\n", off);
ut64 size = r_buf_size (buf);
if (off >= size) {
return NULL;
}
size -= off;
if (!size) {
return NULL;
}
ut8 *b = malloc (size);
if (!b) {
return NULL;
... | 12354681142783714645575373162879180963 | bin_symbols.c | 5185444036263415559996433677051676690 | CWE-787 | CVE-2022-1061 | Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. | https://nvd.nist.gov/vuln/detail/CVE-2022-1061 |
437,671 | radare2 | d4ce40b516ffd70cf2e9e36832d8de139117d522 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 | Fix oobread in symbols header parsing ##bin | 0 | static RCoreSymCacheElement *parseDragons(RBinFile *bf, RBuffer *buf, int off, int bits, R_OWN char *file_name) {
D eprintf ("Dragons at 0x%x\n", off);
st64 size = r_buf_size (buf);
if (off >= size) {
return NULL;
}
size -= off;
if (!size) {
return NULL;
}
if (size < 32) {
return NULL;
}
ut8 *b = malloc... | 161522561097046138638560232136347291203 | bin_symbols.c | 78009235824912653993940702914741768463 | CWE-787 | CVE-2022-1061 | Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8. | https://nvd.nist.gov/vuln/detail/CVE-2022-1061 |
210,669 | ImageMagick6 | 210474b2fac6a661bfa7ed563213920e93e76395 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/210474b2fac6a661bfa7ed563213920e93e76395 | Fix ultra rare but potential memory-leak | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
IndexPacket
index;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
register IndexPacket
*indexes;
register ... | 30229592861865697728644210229360552083 | bmp.c | 87642086170701008397384161090320956088 | CWE-401 | CVE-2019-13133 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13133 |
439,114 | ImageMagick6 | 210474b2fac6a661bfa7ed563213920e93e76395 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/210474b2fac6a661bfa7ed563213920e93e76395 | Fix ultra rare but potential memory-leak | 0 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
IndexPacket
index;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
register IndexPacket
*indexes;
register ... | 31482023248196761538245576709415402386 | bmp.c | 138018406162232274943459037643327051251 | CWE-401 | CVE-2019-13133 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13133 |
210,700 | squashfs-tools | 79b5a555058eef4e1e7ff220c344d39f8cd09646 | https://github.com/plougher/squashfs-tools | https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | Unsquashfs: fix write outside destination directory exploit
An issue on Github (https://github.com/plougher/squashfs-tools/issues/72)
shows how some specially crafted Squashfs filesystems containing
invalid file names (with '/' and ..) can cause Unsquashfs to write
files outside of the destination directory.
This com... | 1 | static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset,
struct inode **i)
{
squashfs_dir_header_2 dirh;
char buffer[sizeof(squashfs_dir_entry_2) + SQUASHFS_NAME_LEN + 1]
__attribute__((aligned));
squashfs_dir_entry_2 *dire = (squashfs_dir_entry_2 *) buffer;
long long start;
int bytes;... | 337353141626678057542635238119408606270 | None | CWE-22 | CVE-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination... | https://nvd.nist.gov/vuln/detail/CVE-2021-40153 | |
439,495 | squashfs-tools | 79b5a555058eef4e1e7ff220c344d39f8cd09646 | https://github.com/plougher/squashfs-tools | https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | Unsquashfs: fix write outside destination directory exploit
An issue on Github (https://github.com/plougher/squashfs-tools/issues/72)
shows how some specially crafted Squashfs filesystems containing
invalid file names (with '/' and ..) can cause Unsquashfs to write
files outside of the destination directory.
This com... | 0 | static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset,
struct inode **i)
{
squashfs_dir_header_2 dirh;
char buffer[sizeof(squashfs_dir_entry_2) + SQUASHFS_NAME_LEN + 1]
__attribute__((aligned));
squashfs_dir_entry_2 *dire = (squashfs_dir_entry_2 *) buffer;
long long start;
int bytes;... | 199340706190975735867110978341140950924 | None | CWE-22 | CVE-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination... | https://nvd.nist.gov/vuln/detail/CVE-2021-40153 | |
210,701 | squashfs-tools | 79b5a555058eef4e1e7ff220c344d39f8cd09646 | https://github.com/plougher/squashfs-tools | https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | Unsquashfs: fix write outside destination directory exploit
An issue on Github (https://github.com/plougher/squashfs-tools/issues/72)
shows how some specially crafted Squashfs filesystems containing
invalid file names (with '/' and ..) can cause Unsquashfs to write
files outside of the destination directory.
This com... | 1 | static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset,
struct inode **i)
{
squashfs_dir_header_3 dirh;
char buffer[sizeof(squashfs_dir_entry_3) + SQUASHFS_NAME_LEN + 1]
__attribute__((aligned));
squashfs_dir_entry_3 *dire = (squashfs_dir_entry_3 *) buffer;
long long start;
int bytes;... | 116402969943084287107249411216213408317 | None | CWE-22 | CVE-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination... | https://nvd.nist.gov/vuln/detail/CVE-2021-40153 | |
439,495 | squashfs-tools | 79b5a555058eef4e1e7ff220c344d39f8cd09646 | https://github.com/plougher/squashfs-tools | https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | Unsquashfs: fix write outside destination directory exploit
An issue on Github (https://github.com/plougher/squashfs-tools/issues/72)
shows how some specially crafted Squashfs filesystems containing
invalid file names (with '/' and ..) can cause Unsquashfs to write
files outside of the destination directory.
This com... | 0 | static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset,
struct inode **i)
{
squashfs_dir_header_2 dirh;
char buffer[sizeof(squashfs_dir_entry_2) + SQUASHFS_NAME_LEN + 1]
__attribute__((aligned));
squashfs_dir_entry_2 *dire = (squashfs_dir_entry_2 *) buffer;
long long start;
int bytes;... | 199340706190975735867110978341140950924 | None | CWE-22 | CVE-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination... | https://nvd.nist.gov/vuln/detail/CVE-2021-40153 | |
210,702 | squashfs-tools | 79b5a555058eef4e1e7ff220c344d39f8cd09646 | https://github.com/plougher/squashfs-tools | https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | Unsquashfs: fix write outside destination directory exploit
An issue on Github (https://github.com/plougher/squashfs-tools/issues/72)
shows how some specially crafted Squashfs filesystems containing
invalid file names (with '/' and ..) can cause Unsquashfs to write
files outside of the destination directory.
This com... | 1 | static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset,
struct inode **i)
{
struct squashfs_dir_header dirh;
char buffer[sizeof(struct squashfs_dir_entry) + SQUASHFS_NAME_LEN + 1]
__attribute__((aligned));
struct squashfs_dir_entry *dire = (struct squashfs_dir_entry *) buffer;
long lon... | 154561395254122138545216205310820189651 | None | CWE-22 | CVE-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination... | https://nvd.nist.gov/vuln/detail/CVE-2021-40153 | |
439,500 | squashfs-tools | 79b5a555058eef4e1e7ff220c344d39f8cd09646 | https://github.com/plougher/squashfs-tools | https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | Unsquashfs: fix write outside destination directory exploit
An issue on Github (https://github.com/plougher/squashfs-tools/issues/72)
shows how some specially crafted Squashfs filesystems containing
invalid file names (with '/' and ..) can cause Unsquashfs to write
files outside of the destination directory.
This com... | 0 | static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset,
struct inode **i)
{
struct squashfs_dir_header dirh;
char buffer[sizeof(struct squashfs_dir_entry) + SQUASHFS_NAME_LEN + 1]
__attribute__((aligned));
struct squashfs_dir_entry *dire = (struct squashfs_dir_entry *) buffer;
long lon... | 43120172755872228262829058526345637532 | None | CWE-22 | CVE-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination... | https://nvd.nist.gov/vuln/detail/CVE-2021-40153 | |
210,866 | xserver | 144849ea27230962227e62a943b399e2ab304787 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://gitlab.freedesktop.org/xorg/xserver/-/commit/144849ea27230962227e62a943b399e2ab304787 | Fix XkbSelectEvents() integer underflow
CVE-2020-14361 ZDI-CAN 11573
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 1 | SProcXkbSelectEvents(ClientPtr client)
{
REQUEST(xkbSelectEventsReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xkbSelectEventsReq);
swaps(&stuff->deviceSpec);
swaps(&stuff->affectWhich);
swaps(&stuff->clear);
swaps(&stuff->selectAll);
swaps(&stuff->affectMap);
swaps(&stuff->map)... | 49390769000512777763270194535836546170 | xkbSwap.c | 248954015122387054723435955727908433288 | CWE-191 | CVE-2020-14361 | A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-14361 |
441,822 | xserver | 144849ea27230962227e62a943b399e2ab304787 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://gitlab.freedesktop.org/xorg/xserver/-/commit/144849ea27230962227e62a943b399e2ab304787 | Fix XkbSelectEvents() integer underflow
CVE-2020-14361 ZDI-CAN 11573
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 0 | SProcXkbSelectEvents(ClientPtr client)
{
REQUEST(xkbSelectEventsReq);
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xkbSelectEventsReq);
swaps(&stuff->deviceSpec);
swaps(&stuff->affectWhich);
swaps(&stuff->clear);
swaps(&stuff->selectAll);
swaps(&stuff->affectMap);
swaps(&stuff->map)... | 168019691135253524576440591667545390332 | xkbSwap.c | 269646087598713036939088933146683136630 | CWE-191 | CVE-2020-14361 | A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-14361 |
210,887 | qemu | 1caff0340f49c93d535c6558a5138d20d475315c | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1caff0340f49c93d535c6558a5138d20d475315c | e1000: switch to use qemu_receive_packet() for loopback
This patch switches to use qemu_receive_packet() which can detect
reentrancy and return early.
This is intended to address CVE-2021-3416.
Cc: Prasad J Pandit <ppandit@redhat.com>
Cc: qemu-stable@nongnu.org
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>... | 1 | e1000_send_packet(E1000State *s, const uint8_t *buf, int size)
{
static const int PTCregs[6] = { PTC64, PTC127, PTC255, PTC511,
PTC1023, PTC1522 };
NetClientState *nc = qemu_get_queue(s->nic);
if (s->phy_reg[PHY_CTRL] & MII_CR_LOOPBACK) {
nc->info->receive(nc, bu... | 230013883840968138268073793174320435209 | e1000.c | 176409209781362413917058775514144703306 | CWE-835 | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
442,189 | qemu | 1caff0340f49c93d535c6558a5138d20d475315c | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1caff0340f49c93d535c6558a5138d20d475315c | e1000: switch to use qemu_receive_packet() for loopback
This patch switches to use qemu_receive_packet() which can detect
reentrancy and return early.
This is intended to address CVE-2021-3416.
Cc: Prasad J Pandit <ppandit@redhat.com>
Cc: qemu-stable@nongnu.org
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>... | 0 | e1000_send_packet(E1000State *s, const uint8_t *buf, int size)
{
static const int PTCregs[6] = { PTC64, PTC127, PTC255, PTC511,
PTC1023, PTC1522 };
NetClientState *nc = qemu_get_queue(s->nic);
if (s->phy_reg[PHY_CTRL] & MII_CR_LOOPBACK) {
qemu_receive_packet(nc, ... | 300536712775088152847906693971285564175 | e1000.c | 47410790699069024700445146821057200888 | CWE-835 | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
210,910 | vim | de05bb25733c3319e18dca44e9b59c6ee389eb26 | https://github.com/vim/vim | https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26 | patch 8.2.4074: going over the end of NameBuff
Problem: Going over the end of NameBuff.
Solution: Check length when appending a space. | 1 | win_redr_status(win_T *wp, int ignore_pum UNUSED)
{
int row;
char_u *p;
int len;
int fillchar;
int attr;
int this_ru_col;
static int busy = FALSE;
// It's possible to get here recursively when 'statusline' (indirectly)
// invokes ":redrawstatus". Simply ignore the call then.
... | 276232884514343858652101986950507308822 | drawscreen.c | 10568928391803251582913255951861880853 | CWE-200 | CVE-2022-0213 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2022-0213 |
442,959 | vim | de05bb25733c3319e18dca44e9b59c6ee389eb26 | https://github.com/vim/vim | https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26 | patch 8.2.4074: going over the end of NameBuff
Problem: Going over the end of NameBuff.
Solution: Check length when appending a space. | 0 | win_redr_status(win_T *wp, int ignore_pum UNUSED)
{
int row;
char_u *p;
int len;
int fillchar;
int attr;
int this_ru_col;
static int busy = FALSE;
// It's possible to get here recursively when 'statusline' (indirectly)
// invokes ":redrawstatus". Simply ignore the call then.
... | 176741267087496295201275228908142268974 | drawscreen.c | 281263511995685251557666010606597186752 | CWE-200 | CVE-2022-0213 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2022-0213 |
211,090 | cifs-utils | f6eae44a3d05b6515a59651e6bed8b6dde689aec | https://github.com/piastry/cifs-utils | http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=f6eae44a3d05b6515a59651e6bed8b6dde689aec | mtab: handle ENOSPC/EFBIG condition properly when altering mtab
It's possible that when mount.cifs goes to append the mtab that there
won't be enough space to do so, and the mntent won't be appended to the
file in its entirety.
Add a my_endmntent routine that will fflush and then fsync the FILE if
that succeeds. If e... | 1 | add_mtab(char *devname, char *mountpoint, unsigned long flags, const char *fstype)
{
int rc = 0;
uid_t uid;
char *mount_user = NULL;
struct mntent mountent;
FILE *pmntfile;
sigset_t mask, oldmask;
uid = getuid();
if (uid != 0)
mount_user = getusername(uid);
/*
* Set the real uid to the effective uid. Thi... | 273553685691100796690999653932620048883 | mount.cifs.c | 178835896677030263209716239403402725405 | CWE-20 | CVE-2011-1678 | smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_F... | https://nvd.nist.gov/vuln/detail/CVE-2011-1678 |
444,900 | cifs-utils | f6eae44a3d05b6515a59651e6bed8b6dde689aec | https://github.com/piastry/cifs-utils | http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=f6eae44a3d05b6515a59651e6bed8b6dde689aec | mtab: handle ENOSPC/EFBIG condition properly when altering mtab
It's possible that when mount.cifs goes to append the mtab that there
won't be enough space to do so, and the mntent won't be appended to the
file in its entirety.
Add a my_endmntent routine that will fflush and then fsync the FILE if
that succeeds. If e... | 0 | add_mtab(char *devname, char *mountpoint, unsigned long flags, const char *fstype)
{
int rc = 0, tmprc, fd;
uid_t uid;
char *mount_user = NULL;
struct mntent mountent;
struct stat statbuf;
FILE *pmntfile;
sigset_t mask, oldmask;
uid = getuid();
if (uid != 0)
mount_user = getusername(uid);
/*
* Set the r... | 145620494366436562739751095487223645254 | mount.cifs.c | 77793306769877718806811810196619780209 | CWE-20 | CVE-2011-1678 | smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_F... | https://nvd.nist.gov/vuln/detail/CVE-2011-1678 |
211,126 | libmobi | 612562bc1ea38f1708b044e7a079c47a05b1291d | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/612562bc1ea38f1708b044e7a079c47a05b1291d | Fix: index entry label not being zero-terminated with corrupt input | 1 | static MOBI_RET mobi_parse_index_entry(MOBIIndx *indx, const MOBIIdxt idxt, const MOBITagx *tagx, const MOBIOrdt *ordt, MOBIBuffer *buf, const size_t curr_number) {
if (indx == NULL) {
debug_print("%s", "INDX structure not initialized\n");
return MOBI_INIT_FAILED;
}
const size_t entry_offset... | 251371537702901623564985735187675051869 | index.c | 309095437889005741044332361577356993393 | CWE-125 | CVE-2022-1987 | Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. | https://nvd.nist.gov/vuln/detail/CVE-2022-1987 |
446,279 | libmobi | 612562bc1ea38f1708b044e7a079c47a05b1291d | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/612562bc1ea38f1708b044e7a079c47a05b1291d | Fix: index entry label not being zero-terminated with corrupt input | 0 | static MOBI_RET mobi_parse_index_entry(MOBIIndx *indx, const MOBIIdxt idxt, const MOBITagx *tagx, const MOBIOrdt *ordt, MOBIBuffer *buf, const size_t curr_number) {
if (indx == NULL) {
debug_print("%s", "INDX structure not initialized\n");
return MOBI_INIT_FAILED;
}
const size_t entry_offset... | 15245136244377426883811242014385645170 | index.c | 108195340824579059268746364836110051712 | CWE-125 | CVE-2022-1987 | Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. | https://nvd.nist.gov/vuln/detail/CVE-2022-1987 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.