idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
string
file_name
string
file_hash
string
cwe
string
cve
string
cve_desc
string
nvd_url
string
204,115
openldap
3539fc33212b528c56b716584f2c2994af7c30b0
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
ITS#9454 fix issuerAndThisUpdateCheck
1
issuerAndThisUpdateCheck( struct berval *in, struct berval *is, struct berval *tu, void *ctx ) { int numdquotes = 0; struct berval x = *in; struct berval ni = BER_BVNULL; /* Parse GSER format */ enum { HAVE_NONE = 0x0, HAVE_ISSUER = 0x1, HAVE_THISUPDATE = 0x2, HAVE_ALL = ( HAVE_ISSUER | HAVE_THISUPDAT...
320953270427993363171410441809926002124
schema_init.c
177224706623297221858931327325567866275
CWE-617
CVE-2021-27212
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
353,015
openldap
3539fc33212b528c56b716584f2c2994af7c30b0
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
ITS#9454 fix issuerAndThisUpdateCheck
0
issuerAndThisUpdateCheck( struct berval *in, struct berval *is, struct berval *tu, void *ctx ) { int numdquotes = 0; struct berval x = *in; struct berval ni = BER_BVNULL; /* Parse GSER format */ enum { HAVE_NONE = 0x0, HAVE_ISSUER = 0x1, HAVE_THISUPDATE = 0x2, HAVE_ALL = ( HAVE_ISSUER | HAVE_THISUPDAT...
298149048073642841250394521193700631288
schema_init.c
127214091536244192150172242805699646468
CWE-617
CVE-2021-27212
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
204,243
vim
fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
patch 8.2.4206: condition with many "(" causes a crash Problem: Condition with many "(" causes a crash. Solution: Limit recursion to 1000.
1
eval7( char_u **arg, typval_T *rettv, evalarg_T *evalarg, int want_string) // after "." operator { int evaluate = evalarg != NULL && (evalarg->eval_flags & EVAL_EVALUATE); int len; char_u *s; char_u *name_start = NULL; char_u *start_leader, *end_leader; int ret = OK...
36727009233023880586835574908835910206
eval.c
215532001349875821306945607465028796767
CWE-787
CVE-2022-0351
Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0351
355,649
vim
fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
patch 8.2.4206: condition with many "(" causes a crash Problem: Condition with many "(" causes a crash. Solution: Limit recursion to 1000.
0
eval7( char_u **arg, typval_T *rettv, evalarg_T *evalarg, int want_string) // after "." operator { int evaluate = evalarg != NULL && (evalarg->eval_flags & EVAL_EVALUATE); int len; char_u *s; char_u *name_start = NULL; char_u *start_leader, *end_leader; int ret = OK...
324139368658301016034800923930937563014
eval.c
208824404078014502397565483410500490043
CWE-787
CVE-2022-0351
Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0351
204,351
squirrel
23a0620658714b996d20da3d4dd1a0dcf9b0bd98
https://github.com/albertodemichelis/squirrel
https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98
check max member count in class
1
bool SQClass::NewSlot(SQSharedState *ss,const SQObjectPtr &key,const SQObjectPtr &val,bool bstatic) { SQObjectPtr temp; bool belongs_to_static_table = sq_type(val) == OT_CLOSURE || sq_type(val) == OT_NATIVECLOSURE || bstatic; if(_locked && !belongs_to_static_table) return false; //the class already ...
269872855469648419079058130898644045027
sqclass.cpp
75131817582394814638781750834830258905
CWE-125
CVE-2021-41556
sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an out-of-bounds read (in the core interpreter) that can lead to Code Execution. If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality s...
https://nvd.nist.gov/vuln/detail/CVE-2021-41556
357,668
squirrel
23a0620658714b996d20da3d4dd1a0dcf9b0bd98
https://github.com/albertodemichelis/squirrel
https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98
check max member count in class
0
bool SQClass::NewSlot(SQSharedState *ss,const SQObjectPtr &key,const SQObjectPtr &val,bool bstatic) { SQObjectPtr temp; bool belongs_to_static_table = sq_type(val) == OT_CLOSURE || sq_type(val) == OT_NATIVECLOSURE || bstatic; if(_locked && !belongs_to_static_table) return false; //the class already ...
114176109037888032181151333197990654093
sqclass.cpp
129356662613675265537572681929065618991
CWE-125
CVE-2021-41556
sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an out-of-bounds read (in the core interpreter) that can lead to Code Execution. If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality s...
https://nvd.nist.gov/vuln/detail/CVE-2021-41556
204,412
bpf
4b81ccebaeee885ab1aa1438133f2991e3a2b6ea
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea
bpf, ringbuf: Deny reserve of buffers larger than ringbuf A BPF program might try to reserve a buffer larger than the ringbuf size. If the consumer pointer is way ahead of the producer, that would be successfully reserved, allowing the BPF program to read or write out of the ringbuf allocated area. Reported-by: Ryota...
1
static void *__bpf_ringbuf_reserve(struct bpf_ringbuf *rb, u64 size) { unsigned long cons_pos, prod_pos, new_prod_pos, flags; u32 len, pg_off; struct bpf_ringbuf_hdr *hdr; if (unlikely(size > RINGBUF_MAX_RECORD_SZ)) return NULL; len = round_up(size + BPF_RINGBUF_HDR_SZ, 8); cons_pos = smp_load_acquire(&rb->co...
305878074800514937766892583405358065403
ringbuf.c
6876939472683174674440151046802738508
CWE-787
CVE-2021-3489
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny r...
https://nvd.nist.gov/vuln/detail/CVE-2021-3489
359,206
bpf
4b81ccebaeee885ab1aa1438133f2991e3a2b6ea
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea
bpf, ringbuf: Deny reserve of buffers larger than ringbuf A BPF program might try to reserve a buffer larger than the ringbuf size. If the consumer pointer is way ahead of the producer, that would be successfully reserved, allowing the BPF program to read or write out of the ringbuf allocated area. Reported-by: Ryota...
0
static void *__bpf_ringbuf_reserve(struct bpf_ringbuf *rb, u64 size) { unsigned long cons_pos, prod_pos, new_prod_pos, flags; u32 len, pg_off; struct bpf_ringbuf_hdr *hdr; if (unlikely(size > RINGBUF_MAX_RECORD_SZ)) return NULL; len = round_up(size + BPF_RINGBUF_HDR_SZ, 8); if (len > rb->mask + 1) return NU...
233821322614692863219886146117009832812
ringbuf.c
3063228527898556498340075998394929987
CWE-787
CVE-2021-3489
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny r...
https://nvd.nist.gov/vuln/detail/CVE-2021-3489
204,425
frr
6d58272b4cf96f0daa846210dd2104877900f921
https://github.com/FRRouting/frr
https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921
[bgpd] cleanup, compact and consolidate capability parsing code 2007-07-26 Paul Jakma <paul.jakma@sun.com> * (general) Clean up and compact capability parsing slightly. Consolidate validation of length and logging of generic TLV, and memcpy of capability data, thus removing such from cap specifc code (not a...
1
bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length) { u_char *end; struct capability cap; u_char action; struct bgp *bgp; afi_t afi; safi_t safi; bgp = peer->bgp; end = pnt + length; while (pnt < end) { /* We need at least action, capability code and capability len...
158680384884701932457641345037828096002
bgp_packet.c
16679227999356180294013513559974077753
CWE-125
CVE-2022-37032
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-37032
359,365
frr
6d58272b4cf96f0daa846210dd2104877900f921
https://github.com/FRRouting/frr
https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921
[bgpd] cleanup, compact and consolidate capability parsing code 2007-07-26 Paul Jakma <paul.jakma@sun.com> * (general) Clean up and compact capability parsing slightly. Consolidate validation of length and logging of generic TLV, and memcpy of capability data, thus removing such from cap specifc code (not a...
0
bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length) { u_char *end; struct capability_mp_data mpc; struct capability_header *hdr; u_char action; struct bgp *bgp; afi_t afi; safi_t safi; bgp = peer->bgp; end = pnt + length; while (pnt < end) { /* We need at l...
222322579110596507029051344758915923400
bgp_packet.c
203634856057323248974002745421549823051
CWE-125
CVE-2022-37032
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-37032
204,534
admesh
e84d8353f1347e1f26f0a95770d92ba14e6ede38
https://github.com/admesh/admesh
https://github.com/admesh/admesh/commit/e84d8353f1347e1f26f0a95770d92ba14e6ede38
Fix heap buffer overflow in stl_update_connects_remove_1 - Add argument value check to the stl_update_connects_remove_1 - Add neighbor value check in stl_remove_degenerate Fixes https://github.com/admesh/admesh/issues/28 Merges https://github.com/admesh/admesh/pull/55
1
stl_remove_degenerate(stl_file *stl, int facet) { int edge1; int edge2; int edge3; int neighbor1; int neighbor2; int neighbor3; int vnot1; int vnot2; int vnot3; if (stl->error) return; if( !memcmp(&stl->facet_start[facet].vertex[0], &stl->facet_start[facet].vertex[1], sizeof(st...
62749783590026466291303120848549680020
connect.c
88334157411234536587499947341326463538
CWE-125
CVE-2018-25033
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-25033
361,303
admesh
e84d8353f1347e1f26f0a95770d92ba14e6ede38
https://github.com/admesh/admesh
https://github.com/admesh/admesh/commit/e84d8353f1347e1f26f0a95770d92ba14e6ede38
Fix heap buffer overflow in stl_update_connects_remove_1 - Add argument value check to the stl_update_connects_remove_1 - Add neighbor value check in stl_remove_degenerate Fixes https://github.com/admesh/admesh/issues/28 Merges https://github.com/admesh/admesh/pull/55
0
stl_remove_degenerate(stl_file *stl, int facet) { int edge1; int edge2; int edge3; int neighbor1; int neighbor2; int neighbor3; int vnot1; int vnot2; int vnot3; if (stl->error) return; if( !memcmp(&stl->facet_start[facet].vertex[0], &stl->facet_start[facet].vertex[1], sizeof(st...
25155049141523797391201320731237896996
connect.c
216745481854892780790975730037335372174
CWE-125
CVE-2018-25033
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-25033
205,823
ovs
803ed12e31b0377c37d7aa8c94b3b92f2081e349
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349
ipf: release unhandled packets from the batch Since 640d4db788ed ("ipf: Fix a use-after-free error, ...") the ipf framework unconditionally allocates a new dp_packet to track individual fragments. This prevents a use-after-free. However, an additional issue was present - even when the packet buffer is cloned, if the...
1
ipf_extract_frags_from_batch(struct ipf *ipf, struct dp_packet_batch *pb, ovs_be16 dl_type, uint16_t zone, long long now, uint32_t hash_basis) { const size_t pb_cnt = dp_packet_batch_size(pb); int pb_idx; /* Index in a packet batch. */ struct dp_pack...
268719993787134993398351954055334505161
ipf.c
8691777507480014794600271586586377411
CWE-401
CVE-2021-3905
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
https://nvd.nist.gov/vuln/detail/CVE-2021-3905
373,535
ovs
803ed12e31b0377c37d7aa8c94b3b92f2081e349
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349
ipf: release unhandled packets from the batch Since 640d4db788ed ("ipf: Fix a use-after-free error, ...") the ipf framework unconditionally allocates a new dp_packet to track individual fragments. This prevents a use-after-free. However, an additional issue was present - even when the packet buffer is cloned, if the...
0
ipf_extract_frags_from_batch(struct ipf *ipf, struct dp_packet_batch *pb, ovs_be16 dl_type, uint16_t zone, long long now, uint32_t hash_basis) { const size_t pb_cnt = dp_packet_batch_size(pb); int pb_idx; /* Index in a packet batch. */ struct dp_pack...
120994420466199339145680136614353279460
ipf.c
251424754321869382912198899459965953031
CWE-401
CVE-2021-3905
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
https://nvd.nist.gov/vuln/detail/CVE-2021-3905
206,043
gimp
c57f9dcf1934a9ab0cd67650f2dea18cb0902270
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=c57f9dcf1934a9ab0cd67650f2dea18cb0902270
Bug 790784 - (CVE-2017-17784) heap overread in gbr parser / load_image. We were assuming the input name was well formed, hence was nul-terminated. As any data coming from external input, this has to be thorougly checked. Similar to commit 06d24a79af94837d615d0024916bb95a01bf3c59 but adapted to older gimp-2-8 code.
1
load_image (const gchar *filename, GError **error) { gchar *name; gint fd; BrushHeader bh; guchar *brush_buf = NULL; gint32 image_ID; gint32 layer_ID; GimpParasite *parasite; GimpDrawable *drawable; GimpPix...
219487381392289910094593757172224969152
file-gbr.c
210537502330856952427982223109888523462
CWE-125
CVE-2017-17784
In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data.
https://nvd.nist.gov/vuln/detail/CVE-2017-17784
376,678
gimp
c57f9dcf1934a9ab0cd67650f2dea18cb0902270
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=c57f9dcf1934a9ab0cd67650f2dea18cb0902270
Bug 790784 - (CVE-2017-17784) heap overread in gbr parser / load_image. We were assuming the input name was well formed, hence was nul-terminated. As any data coming from external input, this has to be thorougly checked. Similar to commit 06d24a79af94837d615d0024916bb95a01bf3c59 but adapted to older gimp-2-8 code.
0
load_image (const gchar *filename, GError **error) { gchar *name; gint fd; BrushHeader bh; guchar *brush_buf = NULL; gint32 image_ID; gint32 layer_ID; GimpParasite *parasite; GimpDrawable *drawable; GimpPix...
269327823766609487068724383051357537961
file-gbr.c
146644042188037261041231342134151379601
CWE-125
CVE-2017-17784
In GIMP 2.8.22, there is a heap-based buffer over-read in load_image in plug-ins/common/file-gbr.c in the gbr import parser, related to mishandling of UTF-8 data.
https://nvd.nist.gov/vuln/detail/CVE-2017-17784
206,262
vim
c6fdb15d423df22e1776844811d082322475e48a
https://github.com/vim/vim
https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
patch 9.0.0025: accessing beyond allocated memory with the cmdline window Problem: Accessing beyond allocated memory when using the cmdline window in Ex mode. Solution: Use "*" instead of "'<,'>" for Visual mode.
1
parse_command_modifiers( exarg_T *eap, char **errormsg, cmdmod_T *cmod, int skip_only) { char_u *orig_cmd = eap->cmd; char_u *cmd_start = NULL; int use_plus_cmd = FALSE; int starts_with_colon = FALSE; int vim9script = in_vim9script(); int has_visual_range = F...
61928994098668347793112269457604758897
ex_docmd.c
287878878694425028301990758845576774946
CWE-787
CVE-2022-2288
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2288
379,334
vim
c6fdb15d423df22e1776844811d082322475e48a
https://github.com/vim/vim
https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
patch 9.0.0025: accessing beyond allocated memory with the cmdline window Problem: Accessing beyond allocated memory when using the cmdline window in Ex mode. Solution: Use "*" instead of "'<,'>" for Visual mode.
0
parse_command_modifiers( exarg_T *eap, char **errormsg, cmdmod_T *cmod, int skip_only) { char_u *orig_cmd = eap->cmd; char_u *cmd_start = NULL; int use_plus_cmd = FALSE; int starts_with_colon = FALSE; int vim9script = in_vim9script(); int has_visual_range = F...
128847198820720658441664267481456465295
ex_docmd.c
80050062526332961104670632599823980115
CWE-787
CVE-2022-2288
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2288
206,555
php-src
cc08cbc84d46933c1e9e0149633f1ed5d19e45e9
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=cc08cbc84d46933c1e9e0149633f1ed5d19e45e9
Fix #73280: Stack Buffer Overflow in GD dynamicGetbuf We make sure to never pass a negative `rlen` as size to memcpy(). Cf. <https://github.com/libgd/libgd/commit/53110871>.
1
static int dynamicGetbuf (gdIOCtxPtr ctx, void *buf, int len) { int rlen, remain; dpIOCtxPtr dctx; dynamicPtr *dp; dctx = (dpIOCtxPtr) ctx; dp = dctx->dp; remain = dp->logicalSize - dp->pos; if (remain >= len) { rlen = len; } else { if (remain == 0) { return EOF; } rlen = remain; } memcpy(buf, (...
44554623121680820346289655905713695377
gd_io_dp.c
66950500877592745162628589676156559345
CWE-119
CVE-2016-8670
Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagec...
https://nvd.nist.gov/vuln/detail/CVE-2016-8670
382,797
php-src
cc08cbc84d46933c1e9e0149633f1ed5d19e45e9
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=cc08cbc84d46933c1e9e0149633f1ed5d19e45e9
Fix #73280: Stack Buffer Overflow in GD dynamicGetbuf We make sure to never pass a negative `rlen` as size to memcpy(). Cf. <https://github.com/libgd/libgd/commit/53110871>.
0
static int dynamicGetbuf (gdIOCtxPtr ctx, void *buf, int len) { int rlen, remain; dpIOCtxPtr dctx; dynamicPtr *dp; dctx = (dpIOCtxPtr) ctx; dp = dctx->dp; remain = dp->logicalSize - dp->pos; if (remain >= len) { rlen = len; } else { if (remain <= 0) { return EOF; } rlen = remain; } memcpy(buf, (...
227798178939410399739015256330671261805
gd_io_dp.c
171487762597506665250744911889099357441
CWE-119
CVE-2016-8670
Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagec...
https://nvd.nist.gov/vuln/detail/CVE-2016-8670
206,588
php-src
feba44546c27b0158f9ac20e72040a224b918c75
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=feba44546c27b0158f9ac20e72040a224b918c75
Fixed bug #22965 (Crash in gd lib's ImageFillToBorder()).
1
gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color) { int lastBorder; /* Seek left */ int leftLimit, rightLimit; int i; leftLimit = (-1); if (border < 0) { /* Refuse to fill to a non-solid border */ return; } for (i = x; (i >= 0); i--) { if (gdImageGetPix...
198226344899217828573742271884272950799
None
CWE-119
CVE-2015-8874
Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
https://nvd.nist.gov/vuln/detail/CVE-2015-8874
383,316
php-src
feba44546c27b0158f9ac20e72040a224b918c75
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=feba44546c27b0158f9ac20e72040a224b918c75
Fixed bug #22965 (Crash in gd lib's ImageFillToBorder()).
0
void gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color) { int lastBorder; /* Seek left */ int leftLimit = -1, rightLimit; int i; if (border < 0) { /* Refuse to fill to a non-solid border */ return; } if (x >= im->sx) { x = im->sx - 1; } if (y >= im->sy) { y = im->sy - 1; } fo...
4519916874419069747672345142292777613
None
CWE-119
CVE-2015-8874
Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
https://nvd.nist.gov/vuln/detail/CVE-2015-8874
206,639
linux
e02f0d3970404bfea385b6edb86f2d936db0ea2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e02f0d3970404bfea385b6edb86f2d936db0ea2b
netfilter: nf_tables: disallow binding to already bound chain Update nft_data_init() to report EINVAL if chain is already bound. Fixes: d0e2c7de92c7 ("netfilter: nf_tables: add NFT_CHAIN_BINDING") Reported-by: Gwangun Jung <exsociety@gmail.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
1
static int nft_verdict_init(const struct nft_ctx *ctx, struct nft_data *data, struct nft_data_desc *desc, const struct nlattr *nla) { u8 genmask = nft_genmask_next(ctx->net); struct nlattr *tb[NFTA_VERDICT_MAX + 1]; struct nft_chain *chain; int err; err = nla_parse_nested_deprecated(tb, NFTA_VERDICT_MAX, n...
76294390154807140346030498178733770308
nf_tables_api.c
280373467088228575441623327249382307245
CWE-703
CVE-2022-39190
An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.
https://nvd.nist.gov/vuln/detail/CVE-2022-39190
384,201
linux
e02f0d3970404bfea385b6edb86f2d936db0ea2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e02f0d3970404bfea385b6edb86f2d936db0ea2b
netfilter: nf_tables: disallow binding to already bound chain Update nft_data_init() to report EINVAL if chain is already bound. Fixes: d0e2c7de92c7 ("netfilter: nf_tables: add NFT_CHAIN_BINDING") Reported-by: Gwangun Jung <exsociety@gmail.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
0
static int nft_verdict_init(const struct nft_ctx *ctx, struct nft_data *data, struct nft_data_desc *desc, const struct nlattr *nla) { u8 genmask = nft_genmask_next(ctx->net); struct nlattr *tb[NFTA_VERDICT_MAX + 1]; struct nft_chain *chain; int err; err = nla_parse_nested_deprecated(tb, NFTA_VERDICT_MAX, n...
189225679685979204194302814541477257663
nf_tables_api.c
161585463478410786724773068235961577198
CWE-703
CVE-2022-39190
An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.
https://nvd.nist.gov/vuln/detail/CVE-2022-39190
206,670
nbdkit
6c5faac6a37077cf2366388a80862bb00616d0d8
https://github.com/libguestfs/nbdkit
https://gitlab.com/nbdkit/nbdkit/-/commit/6c5faac6a37077cf2366388a80862bb00616d0d8
server: reset meta context replies on starttls Related to CVE-2021-3716, but not as severe. No compliant client will send NBD_CMD_BLOCK_STATUS unless it first negotiates NBD_OPT_SET_META_CONTEXT. If an attacker injects a premature SET_META_CONTEXT, either the client will never notice (because it never uses BLOCK_STA...
1
negotiate_handshake_newstyle_options (void) { GET_CONN; struct nbd_new_option new_option; size_t nr_options; bool list_seen = false; uint64_t version; uint32_t option; uint32_t optlen; struct nbd_export_name_option_reply handshake_finish; const char *optname; uint64_t exportsize; struct backend *b...
230092713719482299459555478858076762309
protocol-handshake-newstyle.c
263209595426945567952192628081217546469
CWE-924
CVE-2021-3716
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. T...
https://nvd.nist.gov/vuln/detail/CVE-2021-3716
384,677
nbdkit
6c5faac6a37077cf2366388a80862bb00616d0d8
https://github.com/libguestfs/nbdkit
https://gitlab.com/nbdkit/nbdkit/-/commit/6c5faac6a37077cf2366388a80862bb00616d0d8
server: reset meta context replies on starttls Related to CVE-2021-3716, but not as severe. No compliant client will send NBD_CMD_BLOCK_STATUS unless it first negotiates NBD_OPT_SET_META_CONTEXT. If an attacker injects a premature SET_META_CONTEXT, either the client will never notice (because it never uses BLOCK_STA...
0
negotiate_handshake_newstyle_options (void) { GET_CONN; struct nbd_new_option new_option; size_t nr_options; bool list_seen = false; uint64_t version; uint32_t option; uint32_t optlen; struct nbd_export_name_option_reply handshake_finish; const char *optname; uint64_t exportsize; struct backend *b...
13793654971535202622888110493636437287
protocol-handshake-newstyle.c
210643238405506282504328455056206224474
CWE-924
CVE-2021-3716
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. T...
https://nvd.nist.gov/vuln/detail/CVE-2021-3716
206,676
vim
777e7c21b7627be80961848ac560cb0a9978ff43
https://github.com/vim/vim
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
patch 8.2.3564: invalid memory access when scrolling without valid screen Problem: Invalid memory access when scrolling without a valid screen. Solution: Do not set VALID_BOTLINE in w_valid.
1
update_topline(void) { long line_count; int halfheight; int n; linenr_T old_topline; #ifdef FEAT_DIFF int old_topfill; #endif #ifdef FEAT_FOLDING linenr_T lnum; #endif int check_topline = FALSE; int check_botline = FALSE; long *so_ptr = curwin->w_p_so >= 0 ? &curwin->w_p_...
228543629723963000813717359055705778977
move.c
235877722919937919149866597040080656666
CWE-122
CVE-2021-3903
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-3903
384,767
vim
777e7c21b7627be80961848ac560cb0a9978ff43
https://github.com/vim/vim
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
patch 8.2.3564: invalid memory access when scrolling without valid screen Problem: Invalid memory access when scrolling without a valid screen. Solution: Do not set VALID_BOTLINE in w_valid.
0
update_topline(void) { long line_count; int halfheight; int n; linenr_T old_topline; #ifdef FEAT_DIFF int old_topfill; #endif #ifdef FEAT_FOLDING linenr_T lnum; #endif int check_topline = FALSE; int check_botline = FALSE; long *so_ptr = curwin->w_p_so >= 0 ? &curwin->w_p_...
318695242827135485367008238388311307871
move.c
216110417083492209479100354226379064539
CWE-122
CVE-2021-3903
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-3903
206,677
vim
5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
patch 8.2.4418: crash when using special multi-byte character Problem: Crash when using special multi-byte character. Solution: Don't use isalpha() for an arbitrary character.
1
unix_expandpath( garray_T *gap, char_u *path, int wildoff, int flags, // EW_* flags int didstar) // expanded "**" once already { char_u *buf; char_u *path_end; char_u *p, *s, *e; int start_len = gap->ga_len; char_u *pat; regmatch_T regmatch; int starts_with_dot; ...
312674114892145176500352390912517515307
filepath.c
229066241137802797352238773426978474827
CWE-703
CVE-2022-0685
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
384,803
vim
5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
https://github.com/vim/vim
https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
patch 8.2.4418: crash when using special multi-byte character Problem: Crash when using special multi-byte character. Solution: Don't use isalpha() for an arbitrary character.
0
unix_expandpath( garray_T *gap, char_u *path, int wildoff, int flags, // EW_* flags int didstar) // expanded "**" once already { char_u *buf; char_u *path_end; char_u *p, *s, *e; int start_len = gap->ga_len; char_u *pat; regmatch_T regmatch; int starts_with_dot; ...
314207374277767272342244288300260252688
filepath.c
268435853121240029622170757643385181583
CWE-703
CVE-2022-0685
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
https://nvd.nist.gov/vuln/detail/CVE-2022-0685
207,150
squirrel
a6413aa690e0bdfef648c68693349a7b878fe60d
https://github.com/albertodemichelis/squirrel
https://github.com/albertodemichelis/squirrel/commit/a6413aa690e0bdfef648c68693349a7b878fe60d
fix in thread.call
1
static SQInteger thread_call(HSQUIRRELVM v) { SQObjectPtr o = stack_get(v,1); if(sq_type(o) == OT_THREAD) { SQInteger nparams = sq_gettop(v); _thread(o)->Push(_thread(o)->_roottable); for(SQInteger i = 2; i<(nparams+1); i++) sq_move(_thread(o),v,i); if(SQ_SUCCEEDED(sq...
39783972208477930534182111058478291044
sqbaselib.cpp
22214130882110251892898581176850711195
CWE-703
CVE-2022-30292
Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call.
https://nvd.nist.gov/vuln/detail/CVE-2022-30292
393,528
squirrel
a6413aa690e0bdfef648c68693349a7b878fe60d
https://github.com/albertodemichelis/squirrel
https://github.com/albertodemichelis/squirrel/commit/a6413aa690e0bdfef648c68693349a7b878fe60d
fix in thread.call
0
static SQInteger thread_call(HSQUIRRELVM v) { SQObjectPtr o = stack_get(v,1); if(sq_type(o) == OT_THREAD) { SQInteger nparams = sq_gettop(v); sq_reservestack(_thread(o), nparams + 3); _thread(o)->Push(_thread(o)->_roottable); for(SQInteger i = 2; i<(nparams+1); i++) s...
185870701968227218426869749475686341047
sqbaselib.cpp
167918424394936848193603192917033144376
CWE-703
CVE-2022-30292
Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call.
https://nvd.nist.gov/vuln/detail/CVE-2022-30292
207,461
autotrace
e96bffadc25ff0ba0e10745f8012efcc5f920ea9
https://github.com/autotrace/autotrace
https://github.com/autotrace/autotrace/commit/e96bffadc25ff0ba0e10745f8012efcc5f920ea9
input-bmp: Increase header buffer in some cases Signed-off-by: Peter Lemenkov <lemenkov@gmail.com>
1
at_bitmap input_bmp_reader(gchar * filename, at_input_opts_type * opts, at_msg_func msg_func, gpointer msg_data, gpointer user_data) { FILE *fd; unsigned char buffer[64]; int ColormapSize, rowbytes, Maps; gboolean Grey = FALSE; unsigned char ColorMap[256][3]; at_bitmap image = at_bitmap_init(0, 0, 0, 1); ...
217805098145205715295086602544452101199
input-bmp.c
38605146891124325135879659140059354528
CWE-787
CVE-2022-32323
AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.
https://nvd.nist.gov/vuln/detail/CVE-2022-32323
397,644
autotrace
e96bffadc25ff0ba0e10745f8012efcc5f920ea9
https://github.com/autotrace/autotrace
https://github.com/autotrace/autotrace/commit/e96bffadc25ff0ba0e10745f8012efcc5f920ea9
input-bmp: Increase header buffer in some cases Signed-off-by: Peter Lemenkov <lemenkov@gmail.com>
0
at_bitmap input_bmp_reader(gchar * filename, at_input_opts_type * opts, at_msg_func msg_func, gpointer msg_data, gpointer user_data) { FILE *fd; unsigned char buffer[128]; int ColormapSize, rowbytes, Maps; gboolean Grey = FALSE; unsigned char ColorMap[256][3]; at_bitmap image = at_bitmap_init(0, 0, 0, 1); ...
18153038985911000449594893666433988306
input-bmp.c
29852375577809733693857999744439179756
CWE-787
CVE-2022-32323
AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.
https://nvd.nist.gov/vuln/detail/CVE-2022-32323
207,520
rizin
aa6917772d2f32e5a7daab25a46c72df0b5ea406
https://github.com/rizinorg/rizin
https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406
Fix oob write for dwarf with abbrev with count 0 (Fix #2083) (#2086)
1
static const ut8 *parse_die(const ut8 *buf, const ut8 *buf_end, RzBinDwarfDebugInfo *info, RzBinDwarfAbbrevDecl *abbrev, RzBinDwarfCompUnitHdr *hdr, RzBinDwarfDie *die, const ut8 *debug_str, size_t debug_str_len, bool big_endian) { size_t i; const char *comp_dir = NULL; ut64 line_info_offset = UT64_MAX; for (i = 0...
26636529307671690704479532140631853142
dwarf.c
327051726619513035208543664099881519843
CWE-787
CVE-2021-43814
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute u...
https://nvd.nist.gov/vuln/detail/CVE-2021-43814
398,518
rizin
aa6917772d2f32e5a7daab25a46c72df0b5ea406
https://github.com/rizinorg/rizin
https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406
Fix oob write for dwarf with abbrev with count 0 (Fix #2083) (#2086)
0
static const ut8 *parse_die(const ut8 *buf, const ut8 *buf_end, RzBinDwarfDebugInfo *info, RzBinDwarfAbbrevDecl *abbrev, RzBinDwarfCompUnitHdr *hdr, RzBinDwarfDie *die, const ut8 *debug_str, size_t debug_str_len, bool big_endian) { size_t i; const char *comp_dir = NULL; ut64 line_info_offset = UT64_MAX; if (abbrev...
51977580595649091612975538237343950990
dwarf.c
92035029709372705681125485016113687180
CWE-787
CVE-2021-43814
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute u...
https://nvd.nist.gov/vuln/detail/CVE-2021-43814
207,700
EternalTerminal
900348bb8bc96e1c7ba4888ac8480f643c43d3c3
https://github.com/MisterTea/EternalTerminal
https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3
red fixes (#468) * red fixes * remove magic number
1
TerminalUserInfo UserTerminalRouter::getInfoForId(const string &id) { auto it = idInfoMap.find(id); if (it == idInfoMap.end()) { STFATAL << " Tried to read from an id that no longer exists"; } return it->second; }
65652485071667159611859578809507103310
UserTerminalRouter.cpp
95512591738948248593704083286692164926
CWE-362
CVE-2022-24950
A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().
https://nvd.nist.gov/vuln/detail/CVE-2022-24950
400,109
EternalTerminal
900348bb8bc96e1c7ba4888ac8480f643c43d3c3
https://github.com/MisterTea/EternalTerminal
https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3
red fixes (#468) * red fixes * remove magic number
0
TerminalUserInfo UserTerminalRouter::getInfoForId(const string &id) { lock_guard<recursive_mutex> guard(routerMutex); auto it = idInfoMap.find(id); if (it == idInfoMap.end()) { STFATAL << " Tried to read from an id that no longer exists"; } return it->second; }
194538535842091525230611933768280108618
UserTerminalRouter.cpp
33756077495418666193931642880316711781
CWE-362
CVE-2022-24950
A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().
https://nvd.nist.gov/vuln/detail/CVE-2022-24950
207,703
EternalTerminal
900348bb8bc96e1c7ba4888ac8480f643c43d3c3
https://github.com/MisterTea/EternalTerminal
https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3
red fixes (#468) * red fixes * remove magic number
1
set<int> PipeSocketHandler::listen(const SocketEndpoint& endpoint) { lock_guard<std::recursive_mutex> guard(globalMutex); string pipePath = endpoint.name(); if (pipeServerSockets.find(pipePath) != pipeServerSockets.end()) { throw runtime_error("Tried to listen twice on the same path"); } sockaddr_un loc...
148534117660985776148799839801292812152
PipeSocketHandler.cpp
83158573064577402992437694952965778259
CWE-362
CVE-2022-24950
A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().
https://nvd.nist.gov/vuln/detail/CVE-2022-24950
400,103
EternalTerminal
900348bb8bc96e1c7ba4888ac8480f643c43d3c3
https://github.com/MisterTea/EternalTerminal
https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3
red fixes (#468) * red fixes * remove magic number
0
set<int> PipeSocketHandler::listen(const SocketEndpoint& endpoint) { lock_guard<std::recursive_mutex> guard(globalMutex); string pipePath = endpoint.name(); if (pipeServerSockets.find(pipePath) != pipeServerSockets.end()) { throw runtime_error("Tried to listen twice on the same path"); } sockaddr_un loc...
36125659257824603505725557266857282888
PipeSocketHandler.cpp
231978839420872719355627255082595640778
CWE-362
CVE-2022-24950
A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().
https://nvd.nist.gov/vuln/detail/CVE-2022-24950
207,719
vim
e98c88c44c308edaea5994b8ad4363e65030968c
https://github.com/vim/vim
https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c
patch 9.0.0218: reading before the start of the line Problem: Reading before the start of the line. Solution: When displaying "$" check the column is not negative.
1
display_dollar(colnr_T col) { colnr_T save_col; if (!redrawing()) return; cursor_off(); save_col = curwin->w_cursor.col; curwin->w_cursor.col = col; if (has_mbyte) { char_u *p; // If on the last byte of a multi-byte move to the first byte. p = ml_get_curline(); curwin->w_cursor.col -...
56781688432244503822784219524894149055
edit.c
251788010034679613424556948955874474953
CWE-787
CVE-2022-2845
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
https://nvd.nist.gov/vuln/detail/CVE-2022-2845
400,409
vim
e98c88c44c308edaea5994b8ad4363e65030968c
https://github.com/vim/vim
https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c
patch 9.0.0218: reading before the start of the line Problem: Reading before the start of the line. Solution: When displaying "$" check the column is not negative.
0
display_dollar(colnr_T col_arg) { colnr_T col = col_arg < 0 ? 0 : col_arg; colnr_T save_col; if (!redrawing()) return; cursor_off(); save_col = curwin->w_cursor.col; curwin->w_cursor.col = col; if (has_mbyte) { char_u *p; // If on the last byte of a multi-byte move to the first byt...
125832747032800290670744012264167596321
edit.c
91657375912486719968624749742093008286
CWE-787
CVE-2022-2845
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
https://nvd.nist.gov/vuln/detail/CVE-2022-2845
207,753
linux
9d2231c5d74e13b2a0546fee6737ee4446017903
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9d2231c5d74e13b2a0546fee6737ee4446017903
lib/iov_iter: initialize "flags" in new pipe_buffer The functions copy_page_to_iter_pipe() and push_pipe() can both allocate a new pipe_buffer, but the "flags" member initializer is missing. Fixes: 241699cd72a8 ("new iov_iter flavour: pipe-backed") To: Alexander Viro <viro@zeniv.linux.org.uk> To: linux-fsdevel@vger.k...
1
static size_t copy_page_to_iter_pipe(struct page *page, size_t offset, size_t bytes, struct iov_iter *i) { struct pipe_inode_info *pipe = i->pipe; struct pipe_buffer *buf; unsigned int p_tail = pipe->tail; unsigned int p_mask = pipe->ring_size - 1; unsigned int i_head = i->head; size_t off; if (unlikely(byt...
167718514506109094299086513897213873936
iov_iter.c
181499146794090302160100800341530380411
CWE-284
CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read o...
https://nvd.nist.gov/vuln/detail/CVE-2022-0847
400,735
linux
9d2231c5d74e13b2a0546fee6737ee4446017903
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9d2231c5d74e13b2a0546fee6737ee4446017903
lib/iov_iter: initialize "flags" in new pipe_buffer The functions copy_page_to_iter_pipe() and push_pipe() can both allocate a new pipe_buffer, but the "flags" member initializer is missing. Fixes: 241699cd72a8 ("new iov_iter flavour: pipe-backed") To: Alexander Viro <viro@zeniv.linux.org.uk> To: linux-fsdevel@vger.k...
0
static size_t copy_page_to_iter_pipe(struct page *page, size_t offset, size_t bytes, struct iov_iter *i) { struct pipe_inode_info *pipe = i->pipe; struct pipe_buffer *buf; unsigned int p_tail = pipe->tail; unsigned int p_mask = pipe->ring_size - 1; unsigned int i_head = i->head; size_t off; if (unlikely(byt...
254624609360113587487306617570895393083
iov_iter.c
158086795761237639591506235503715650431
CWE-284
CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read o...
https://nvd.nist.gov/vuln/detail/CVE-2022-0847
207,780
radare2
2b77b277d67ce061ee6ef839e7139ebc2103c1e3
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3
Fix oobread in dyldcache ##crash * Reported by @hdthky via huntr.dev * Reproducers: poc1 * BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82
1
static RList *create_cache_bins(RBinFile *bf, RDyldCache *cache) { RList *bins = r_list_newf ((RListFree)free_bin); ut16 *depArray = NULL; cache_imgxtr_t *extras = NULL; if (!bins) { return NULL; } char *target_libs = NULL; RList *target_lib_names = NULL; int *deps = NULL; target_libs = r_sys_getenv ("R_DYL...
174827048480806807337685920262304563052
None
CWE-703
CVE-2022-1244
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-1244
401,034
radare2
2b77b277d67ce061ee6ef839e7139ebc2103c1e3
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3
Fix oobread in dyldcache ##crash * Reported by @hdthky via huntr.dev * Reproducers: poc1 * BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82
0
static RList *create_cache_bins(RBinFile *bf, RDyldCache *cache) { RList *bins = r_list_newf ((RListFree)free_bin); ut16 *depArray = NULL; cache_imgxtr_t *extras = NULL; if (!bins) { return NULL; } char *target_libs = NULL; RList *target_lib_names = NULL; int *deps = NULL; target_libs = r_sys_getenv ("R_DYL...
125973238096905171890400385176953298313
None
CWE-703
CVE-2022-1244
heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-1244
207,990
pcre2
03654e751e7f0700693526b67dfcadda6b42c9d0
https://github.com/PCRE2Project/pcre2
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
Fixed an issue affecting recursions in JIT
1
static int get_recurse_data_length(compiler_common *common, PCRE2_SPTR cc, PCRE2_SPTR ccend, BOOL *needs_control_head, BOOL *has_quit, BOOL *has_accept) { int length = 1; int size; PCRE2_SPTR alternative; BOOL quit_found = FALSE; BOOL accept_found = FALSE; BOOL setsom_found = FALSE; BOOL setmark_found = FALSE; BOOL c...
240126232931244050288328890875640372325
pcre2_jit_compile.c
105541590302198799083513857874765354258
CWE-703
CVE-2022-1587
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
404,192
pcre2
03654e751e7f0700693526b67dfcadda6b42c9d0
https://github.com/PCRE2Project/pcre2
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
Fixed an issue affecting recursions in JIT
0
static int get_recurse_data_length(compiler_common *common, PCRE2_SPTR cc, PCRE2_SPTR ccend, BOOL *needs_control_head, BOOL *has_quit, BOOL *has_accept) { int length = 1; int size, offset; PCRE2_SPTR alternative; BOOL quit_found = FALSE; BOOL accept_found = FALSE; BOOL setsom_found = FALSE; BOOL setmark_found = FALSE...
173942933444712771516446324481674462692
pcre2_jit_compile.c
52374969195278947710795935639555031915
CWE-703
CVE-2022-1587
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
https://nvd.nist.gov/vuln/detail/CVE-2022-1587
208,107
linux
f85daf0e725358be78dfd208dea5fd665d8cb901
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup() xfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of pols[0]. This refcount can be dropped in xfrm_expand_policies() when xfrm_expand_policies() return error. pols[0]'s refcount is balanced in here. But xfrm_bundle_look...
1
static int xfrm_expand_policies(const struct flowi *fl, u16 family, struct xfrm_policy **pols, int *num_pols, int *num_xfrms) { int i; if (*num_pols == 0 || !pols[0]) { *num_pols = 0; *num_xfrms = 0; return 0; } if (IS_ERR(pols[0])) return PTR_ERR(pols[0]); *num_xfrms = pols[0]->xfrm_nr; #ifdef ...
251684023315514826982518858194996142213
xfrm_policy.c
240690312801703995044299112379503581676
CWE-703
CVE-2022-36879
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
https://nvd.nist.gov/vuln/detail/CVE-2022-36879
405,333
linux
f85daf0e725358be78dfd208dea5fd665d8cb901
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup() xfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of pols[0]. This refcount can be dropped in xfrm_expand_policies() when xfrm_expand_policies() return error. pols[0]'s refcount is balanced in here. But xfrm_bundle_look...
0
static int xfrm_expand_policies(const struct flowi *fl, u16 family, struct xfrm_policy **pols, int *num_pols, int *num_xfrms) { int i; if (*num_pols == 0 || !pols[0]) { *num_pols = 0; *num_xfrms = 0; return 0; } if (IS_ERR(pols[0])) { *num_pols = 0; return PTR_ERR(pols[0]); } *num_xfrms = pols...
29732626654088535700777069321150029090
xfrm_policy.c
264724924246430289692801756816591917107
CWE-703
CVE-2022-36879
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
https://nvd.nist.gov/vuln/detail/CVE-2022-36879
208,140
util-linux
5ebbc3865d1e53ef42e5f121c41faab23dd59075
https://github.com/karelzak/util-linux
http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=5ebbc3865d1e53ef42e5f121c41faab23dd59075
mount: sanitize paths from non-root users $ mount /root/.ssh/../../dev/sda2 mount: only root can mount UUID=17bc65ec-4125-4e7c-8a7d-e2795064c736 on /boot this is too promiscuous. It seems better to ignore on command line specified paths which are not resolve-able for non-root users. Fixed version: $ mount /root...
1
int main(int argc, char **argv) { int c, rc = MOUNT_EX_SUCCESS, all = 0, show_labels = 0; struct libmnt_context *cxt; struct libmnt_table *fstab = NULL; char *srcbuf = NULL; char *types = NULL; unsigned long oper = 0; enum { MOUNT_OPT_SHARED = CHAR_MAX + 1, MOUNT_OPT_SLAVE, MOUNT_OPT_PRIVATE, MOUNT_OPT_...
219498005792940261578066564094421095366
mount.c
324534442685972817552003935079520935664
CWE-200
CVE-2013-0157
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th...
https://nvd.nist.gov/vuln/detail/CVE-2013-0157
406,206
util-linux
5ebbc3865d1e53ef42e5f121c41faab23dd59075
https://github.com/karelzak/util-linux
http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=5ebbc3865d1e53ef42e5f121c41faab23dd59075
mount: sanitize paths from non-root users $ mount /root/.ssh/../../dev/sda2 mount: only root can mount UUID=17bc65ec-4125-4e7c-8a7d-e2795064c736 on /boot this is too promiscuous. It seems better to ignore on command line specified paths which are not resolve-able for non-root users. Fixed version: $ mount /root...
0
int main(int argc, char **argv) { int c, rc = MOUNT_EX_SUCCESS, all = 0, show_labels = 0; struct libmnt_context *cxt; struct libmnt_table *fstab = NULL; char *srcbuf = NULL; char *types = NULL; unsigned long oper = 0; enum { MOUNT_OPT_SHARED = CHAR_MAX + 1, MOUNT_OPT_SLAVE, MOUNT_OPT_PRIVATE, MOUNT_OPT_...
43692452455655783216200177030716124780
mount.c
7925930289343170386207247806304317495
CWE-200
CVE-2013-0157
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th...
https://nvd.nist.gov/vuln/detail/CVE-2013-0157
208,411
vim
27efc62f5d86afcb2ecb7565587fe8dea4b036fe
https://github.com/vim/vim
https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
patch 9.0.0018: going over the end of the typahead Problem: Going over the end of the typahead. Solution: Put a NUL after the typeahead.
1
check_termcode( int max_offset, char_u *buf, int bufsize, int *buflen) { char_u *tp; char_u *p; int slen = 0; // init for GCC int modslen; int len; int retval = 0; int offset; char_u key_name[2]; int modifiers; char_u *modifiers_start = NULL; int key...
196889976171376146553776878857496634863
term.c
255079853890988870585830908048537470004
CWE-787
CVE-2022-2285
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2285
409,515
vim
27efc62f5d86afcb2ecb7565587fe8dea4b036fe
https://github.com/vim/vim
https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
patch 9.0.0018: going over the end of the typahead Problem: Going over the end of the typahead. Solution: Put a NUL after the typeahead.
0
check_termcode( int max_offset, char_u *buf, int bufsize, int *buflen) { char_u *tp; char_u *p; int slen = 0; // init for GCC int modslen; int len; int retval = 0; int offset; char_u key_name[2]; int modifiers; char_u *modifiers_start = NULL; int key...
105354748681163651663383549655228844664
term.c
113564079834188954277061754674630069521
CWE-787
CVE-2022-2285
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2285
208,522
unbound
02080f6b180232f43b77f403d0c038e9360a460f
https://github.com/NLnetLabs/unbound
https://github.com/NLnetLabs/unbound/commit/02080f6b180232f43b77f403d0c038e9360a460f
- Fix Integer Overflows in Size Calculations, reported by X41 D-Sec.
1
dnsc_load_local_data(struct dnsc_env* dnscenv, struct config_file *cfg) { size_t i, j; // Insert 'local-zone: "2.dnscrypt-cert.example.com" deny' if(!cfg_str2list_insert(&cfg->local_zones, strdup(dnscenv->provider_name), strdup("deny"))) { log_err...
44451332163685602086826854088983200257
dnscrypt.c
338731906376917706393921999097571082291
CWE-190
CVE-2019-25038
Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
https://nvd.nist.gov/vuln/detail/CVE-2019-25038
412,117
unbound
02080f6b180232f43b77f403d0c038e9360a460f
https://github.com/NLnetLabs/unbound
https://github.com/NLnetLabs/unbound/commit/02080f6b180232f43b77f403d0c038e9360a460f
- Fix Integer Overflows in Size Calculations, reported by X41 D-Sec.
0
dnsc_load_local_data(struct dnsc_env* dnscenv, struct config_file *cfg) { size_t i, j; // Insert 'local-zone: "2.dnscrypt-cert.example.com" deny' if(!cfg_str2list_insert(&cfg->local_zones, strdup(dnscenv->provider_name), strdup("deny"))) { log_err...
220864762997315196932796822660985000469
dnscrypt.c
151631660973156645492009635074477412124
CWE-190
CVE-2019-25038
Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
https://nvd.nist.gov/vuln/detail/CVE-2019-25038
208,912
vim
1c3dd8ddcba63c1af5112e567215b3cec2de11d0
https://github.com/vim/vim
https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0
patch 9.0.0490: using freed memory with cmdwin and BufEnter autocmd Problem: Using freed memory with cmdwin and BufEnter autocmd. Solution: Make sure pointer to b_p_iminsert is still valid.
1
getcmdline_int( int firstc, long count UNUSED, // only used for incremental search int indent, // indent for inside conditionals int clear_ccline) // clear ccline first { static int depth = 0; // call depth int c; int i; int j; int gotesc = FALSE; // TRUE when <ESC> just...
318420655328659351378249069297989245289
ex_getln.c
35630205531070235041879855338965504689
CWE-416
CVE-2022-3235
Use After Free in GitHub repository vim/vim prior to 9.0.0490.
https://nvd.nist.gov/vuln/detail/CVE-2022-3235
416,366
vim
1c3dd8ddcba63c1af5112e567215b3cec2de11d0
https://github.com/vim/vim
https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0
patch 9.0.0490: using freed memory with cmdwin and BufEnter autocmd Problem: Using freed memory with cmdwin and BufEnter autocmd. Solution: Make sure pointer to b_p_iminsert is still valid.
0
getcmdline_int( int firstc, long count UNUSED, // only used for incremental search int indent, // indent for inside conditionals int clear_ccline) // clear ccline first { static int depth = 0; // call depth int c; int i; int j; int gotesc = FALSE; // TRUE when <ESC> just...
287277157755538522084742430465983420799
ex_getln.c
200105240926561396065075027208565202210
CWE-416
CVE-2022-3235
Use After Free in GitHub repository vim/vim prior to 9.0.0490.
https://nvd.nist.gov/vuln/detail/CVE-2022-3235
209,102
vim
80525751c5ce9ed82c41d83faf9ef38667bf61b1
https://github.com/vim/vim
https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1
patch 9.0.0259: crash with mouse click when not initialized Problem: Crash with mouse click when not initialized. Solution: Check TabPageIdxs[] is not NULL.
1
do_mouse( oparg_T *oap, // operator argument, can be NULL int c, // K_LEFTMOUSE, etc int dir, // Direction to 'put' if necessary long count, int fixindent) // PUT_FIXINDENT if fixing indent necessary { static int do_always = FALSE; // ignore 'mouse' setting next time static int got_cli...
230981879452824566126490545559038336652
mouse.c
48030859742909908779392834945640503907
CWE-703
CVE-2022-2980
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.
https://nvd.nist.gov/vuln/detail/CVE-2022-2980
418,795
vim
80525751c5ce9ed82c41d83faf9ef38667bf61b1
https://github.com/vim/vim
https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1
patch 9.0.0259: crash with mouse click when not initialized Problem: Crash with mouse click when not initialized. Solution: Check TabPageIdxs[] is not NULL.
0
do_mouse( oparg_T *oap, // operator argument, can be NULL int c, // K_LEFTMOUSE, etc int dir, // Direction to 'put' if necessary long count, int fixindent) // PUT_FIXINDENT if fixing indent necessary { static int do_always = FALSE; // ignore 'mouse' setting next time static int got_cli...
340201685272816729984528939326600503133
mouse.c
56805804002879785388836197750941387525
CWE-703
CVE-2022-2980
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.
https://nvd.nist.gov/vuln/detail/CVE-2022-2980
209,801
mujs
f5b3c703e18725e380b83427004632e744f85a6f
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/f5b3c703e18725e380b83427004632e744f85a6f
Issue #161: Cope with empty programs in mujs-pp.
1
void jsP_dumpsyntax(js_State *J, js_Ast *prog, int dominify) { minify = dominify; if (prog->type == AST_LIST) pstmlist(-1, prog); else { pstm(0, prog); nl(); } if (minify > 1) putchar('\n'); }
236329653693817075818818411816465624514
jsdump.c
195852189272926394340196020756121895406
CWE-476
CVE-2022-30975
In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.
https://nvd.nist.gov/vuln/detail/CVE-2022-30975
421,378
mujs
f5b3c703e18725e380b83427004632e744f85a6f
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/f5b3c703e18725e380b83427004632e744f85a6f
Issue #161: Cope with empty programs in mujs-pp.
0
void jsP_dumpsyntax(js_State *J, js_Ast *prog, int dominify) { minify = dominify; if (prog) { if (prog->type == AST_LIST) pstmlist(-1, prog); else { pstm(0, prog); nl(); } } if (minify > 1) putchar('\n'); }
148093103302179844815401983905255483216
jsdump.c
205390724250782891362749099686890673449
CWE-476
CVE-2022-30975
In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.
https://nvd.nist.gov/vuln/detail/CVE-2022-30975
209,955
linux
8188a18ee2e48c9a7461139838048363bfce3fef
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8188a18ee2e48c9a7461139838048363bfce3fef
iwlwifi: pcie: fix rb_allocator workqueue allocation We don't handle failures in the rb_allocator workqueue allocation correctly. To fix that, move the code earlier so the cleanup is easier and we don't have to undo all the interrupt allocations in this case. Signed-off-by: Johannes Berg <johannes.berg@intel.com> Sig...
1
struct iwl_trans *iwl_trans_pcie_alloc(struct pci_dev *pdev, const struct pci_device_id *ent, const struct iwl_cfg_trans_params *cfg_trans) { struct iwl_trans_pcie *trans_pcie; struct iwl_trans *trans; int ret, addr_size; ret = pcim_enable_device(pdev); if (ret) return ERR_PTR(ret); if (cf...
68049028566925957329669846026640837120
trans.c
121825087774406788902524077810084378083
CWE-476
CVE-2019-16234
drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2019-16234
424,969
linux
8188a18ee2e48c9a7461139838048363bfce3fef
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8188a18ee2e48c9a7461139838048363bfce3fef
iwlwifi: pcie: fix rb_allocator workqueue allocation We don't handle failures in the rb_allocator workqueue allocation correctly. To fix that, move the code earlier so the cleanup is easier and we don't have to undo all the interrupt allocations in this case. Signed-off-by: Johannes Berg <johannes.berg@intel.com> Sig...
0
struct iwl_trans *iwl_trans_pcie_alloc(struct pci_dev *pdev, const struct pci_device_id *ent, const struct iwl_cfg_trans_params *cfg_trans) { struct iwl_trans_pcie *trans_pcie; struct iwl_trans *trans; int ret, addr_size; ret = pcim_enable_device(pdev); if (ret) return ERR_PTR(ret); if (cf...
249581055441914689136534991194413858839
trans.c
283396566562106139376150241807074258656
CWE-476
CVE-2019-16234
drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2019-16234
210,050
lua
1f3c6f4534c6411313361697d98d1145a1f030fa
https://github.com/lua/lua
https://github.com/lua/lua/commit/1f3c6f4534c6411313361697d98d1145a1f030fa
Bug: Lua can generate wrong code when _ENV is <const>
1
static void singlevar (LexState *ls, expdesc *var) { TString *varname = str_checkname(ls); FuncState *fs = ls->fs; singlevaraux(fs, varname, var, 1); if (var->k == VVOID) { /* global name? */ expdesc key; singlevaraux(fs, ls->envn, var, 1); /* get environment variable */ lua_assert(var->k != VVOID...
123763961511591581850775011069550713659
lparser.c
295868068220261782570461856132388295005
CWE-125
CVE-2022-28805
singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.
https://nvd.nist.gov/vuln/detail/CVE-2022-28805
427,153
lua
1f3c6f4534c6411313361697d98d1145a1f030fa
https://github.com/lua/lua
https://github.com/lua/lua/commit/1f3c6f4534c6411313361697d98d1145a1f030fa
Bug: Lua can generate wrong code when _ENV is <const>
0
static void singlevar (LexState *ls, expdesc *var) { TString *varname = str_checkname(ls); FuncState *fs = ls->fs; singlevaraux(fs, varname, var, 1); if (var->k == VVOID) { /* global name? */ expdesc key; singlevaraux(fs, ls->envn, var, 1); /* get environment variable */ lua_assert(var->k != VVOID...
86104642186066137571814828089067244595
lparser.c
131633022139792411216417604545990891123
CWE-125
CVE-2022-28805
singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.
https://nvd.nist.gov/vuln/detail/CVE-2022-28805
210,204
linux
cefa91b2332d7009bc0be5d951d6cbbf349f90f8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cefa91b2332d7009bc0be5d951d6cbbf349f90f8
openvswitch: fix OOB access in reserve_sfa_size() Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, if next_offset is greater than MAX_ACTIONS_BUFSIZE, the function reserve_sfa_size() does not return -EMSGSIZE as expected, but it allocates MAX_ACTIONS_BUFS...
1
static struct nlattr *reserve_sfa_size(struct sw_flow_actions **sfa, int attr_len, bool log) { struct sw_flow_actions *acts; int new_acts_size; size_t req_size = NLA_ALIGN(attr_len); int next_offset = offsetof(struct sw_flow_actions, actions) + (*sfa)->actions_len; if (req_size <= (ksize(*sfa) - ...
66009891447134933026284929915758254537
flow_netlink.c
47337588811900760055139247291202023489
CWE-362
CVE-2022-2639
An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw al...
https://nvd.nist.gov/vuln/detail/CVE-2022-2639
430,380
linux
cefa91b2332d7009bc0be5d951d6cbbf349f90f8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cefa91b2332d7009bc0be5d951d6cbbf349f90f8
openvswitch: fix OOB access in reserve_sfa_size() Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, if next_offset is greater than MAX_ACTIONS_BUFSIZE, the function reserve_sfa_size() does not return -EMSGSIZE as expected, but it allocates MAX_ACTIONS_BUFS...
0
static struct nlattr *reserve_sfa_size(struct sw_flow_actions **sfa, int attr_len, bool log) { struct sw_flow_actions *acts; int new_acts_size; size_t req_size = NLA_ALIGN(attr_len); int next_offset = offsetof(struct sw_flow_actions, actions) + (*sfa)->actions_len; if (req_size <= (ksize(*sfa) - ...
241955732354437165048790183048012619919
flow_netlink.c
169733194668607707184956779941409309704
CWE-362
CVE-2022-2639
An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw al...
https://nvd.nist.gov/vuln/detail/CVE-2022-2639
210,206
squid
780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b
Improve handling of Gopher responses (#1022)
1
gopherToHTML(GopherStateData * gopherState, char *inbuf, int len) { char *pos = inbuf; char *lpos = NULL; char *tline = NULL; LOCAL_ARRAY(char, line, TEMP_BUF_SIZE); LOCAL_ARRAY(char, tmpbuf, TEMP_BUF_SIZE); char *name = NULL; char *selector = NULL; char *host = NULL; char *port = NU...
69907744519047196773632287126924030666
gopher.cc
274206304991379198598012995880144954128
CWE-400
CVE-2021-46784
In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
https://nvd.nist.gov/vuln/detail/CVE-2021-46784
430,470
squid
780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b
Improve handling of Gopher responses (#1022)
0
gopherToHTML(GopherStateData * gopherState, char *inbuf, int len) { char *pos = inbuf; char *lpos = NULL; char *tline = NULL; LOCAL_ARRAY(char, line, TEMP_BUF_SIZE); char *name = NULL; char *selector = NULL; char *host = NULL; char *port = NULL; char *escaped_selector = NULL; con...
138686742216343389129906256835749429816
gopher.cc
39955176817113992488945748005868573997
CWE-400
CVE-2021-46784
In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
https://nvd.nist.gov/vuln/detail/CVE-2021-46784
210,271
vim
6669de1b235843968e88844ca6d3c8dec4b01a9e
https://github.com/vim/vim
https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e
patch 9.0.0240: crash when using ":mkspell" with an empty .dic file Problem: Crash when using ":mkspell" with an empty .dic file. Solution: Check for an empty word tree.
1
sug_filltree(spellinfo_T *spin, slang_T *slang) { char_u *byts; idx_T *idxs; int depth; idx_T arridx[MAXWLEN]; int curi[MAXWLEN]; char_u tword[MAXWLEN]; char_u tsalword[MAXWLEN]; int c; idx_T n; unsigned words_done = 0; int wordcount[MAXWLEN]; // We use si_foldroot f...
207388436213910008407743050781298909937
spellfile.c
273224760850620955394187294241739462394
CWE-787
CVE-2022-2923
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
https://nvd.nist.gov/vuln/detail/CVE-2022-2923
432,093
vim
6669de1b235843968e88844ca6d3c8dec4b01a9e
https://github.com/vim/vim
https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e
patch 9.0.0240: crash when using ":mkspell" with an empty .dic file Problem: Crash when using ":mkspell" with an empty .dic file. Solution: Check for an empty word tree.
0
sug_filltree(spellinfo_T *spin, slang_T *slang) { char_u *byts; idx_T *idxs; int depth; idx_T arridx[MAXWLEN]; int curi[MAXWLEN]; char_u tword[MAXWLEN]; char_u tsalword[MAXWLEN]; int c; idx_T n; unsigned words_done = 0; int wordcount[MAXWLEN]; // We use si_foldroot f...
208510972034693515698183125739179180871
spellfile.c
159233725116993104212150761027929059833
CWE-787
CVE-2022-2923
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
https://nvd.nist.gov/vuln/detail/CVE-2022-2923
210,273
mongo
f3604b901d688c194de5e430c7fbab060c9dc8e0
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/f3604b901d688c194de5e430c7fbab060c9dc8e0
SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards
1
createRandomCursorExecutor(const CollectionPtr& coll, const boost::intrusive_ptr<ExpressionContext>& expCtx, long long sampleSize, long long numRecords, boost::optional<BucketUnpacker> bucketUnpacker) { Opera...
239583334467362355681176105432769486304
pipeline_d.cpp
58061396446339864036845237439152201402
CWE-617
CVE-2021-32037
An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e...
https://nvd.nist.gov/vuln/detail/CVE-2021-32037
432,152
mongo
f3604b901d688c194de5e430c7fbab060c9dc8e0
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/f3604b901d688c194de5e430c7fbab060c9dc8e0
SERVER-59071 Treat '$sample' as unsharded when connecting directly to shards
0
createRandomCursorExecutor(const CollectionPtr& coll, const boost::intrusive_ptr<ExpressionContext>& expCtx, long long sampleSize, long long numRecords, boost::optional<BucketUnpacker> bucketUnpacker) { Opera...
248936200771856096728172359306392383142
pipeline_d.cpp
250256559163646850106921369320994189676
CWE-617
CVE-2021-32037
An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled e...
https://nvd.nist.gov/vuln/detail/CVE-2021-32037
210,282
qemu
b05b267840515730dbf6753495d5b7bd8b04ad1c
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c
i2c-ddc: fix oob read Suggested-by: Michael Hanselmann <public@hansmi.ch> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Reviewed-by: Michael Hanselmann <public@hansmi.ch> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Message-id: 20190108102301.1957-1-kraxel@redhat.com
1
static int i2c_ddc_rx(I2CSlave *i2c) { I2CDDCState *s = I2CDDC(i2c); int value; value = s->edid_blob[s->reg]; s->reg++; return value; }
231715994309117248387350691536475330701
i2c-ddc.c
48804313309392962475337802621299781910
CWE-125
CVE-2019-3812
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
https://nvd.nist.gov/vuln/detail/CVE-2019-3812
432,346
qemu
b05b267840515730dbf6753495d5b7bd8b04ad1c
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/b05b267840515730dbf6753495d5b7bd8b04ad1c
i2c-ddc: fix oob read Suggested-by: Michael Hanselmann <public@hansmi.ch> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Reviewed-by: Michael Hanselmann <public@hansmi.ch> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Message-id: 20190108102301.1957-1-kraxel@redhat.com
0
static int i2c_ddc_rx(I2CSlave *i2c) { I2CDDCState *s = I2CDDC(i2c); int value; value = s->edid_blob[s->reg % sizeof(s->edid_blob)]; s->reg++; return value; }
197849623050732713088444316780408422340
i2c-ddc.c
241703496436230749148573739318246335373
CWE-125
CVE-2019-3812
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
https://nvd.nist.gov/vuln/detail/CVE-2019-3812
210,453
ghostpdl
366ad48d076c1aa4c8f83c65011258a04e348207
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=366ad48d076c1aa4c8f83c65011258a04e348207
Bug 701815: avoid uninitialised bytes being >7, which broke indexing. Fixes: ./sanbin/gs -dBATCH -dNOPAUSE -sOutputFile=tmp -sDEVICE=jetp3852 ../bug-701815.pdf
1
jetp3852_print_page(gx_device_printer *pdev, gp_file *prn_stream) { #define DATA_SIZE (LINE_SIZE * 8) unsigned int cnt_2prn; unsigned int count,tempcnt; unsigned char vtp,cntc1,cntc2; int line_size_color_plane; byte data[DATA_SIZE]; byte plane_data[LINE_SIZE * 3]; /* Set initial condition...
93148813029453334596229816591999204427
gdev3852.c
229444063869235911698513683887059150132
CWE-120
CVE-2020-16302
A buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16302
435,409
ghostpdl
366ad48d076c1aa4c8f83c65011258a04e348207
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=366ad48d076c1aa4c8f83c65011258a04e348207
Bug 701815: avoid uninitialised bytes being >7, which broke indexing. Fixes: ./sanbin/gs -dBATCH -dNOPAUSE -sOutputFile=tmp -sDEVICE=jetp3852 ../bug-701815.pdf
0
jetp3852_print_page(gx_device_printer *pdev, gp_file *prn_stream) { #define DATA_SIZE (LINE_SIZE * 8) unsigned int cnt_2prn; unsigned int count,tempcnt; unsigned char vtp,cntc1,cntc2; int line_size_color_plane; byte data[DATA_SIZE]; byte plane_data[LINE_SIZE * 3]; /* Initialise data to ze...
85965008618432429994990471615914575554
gdev3852.c
93770144039043531856386464739578824717
CWE-120
CVE-2020-16302
A buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16302
210,551
oniguruma
4d461376bd85e7994835677b2ff453a43c49cd28
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/4d461376bd85e7994835677b2ff453a43c49cd28
don't expand string case folds to alternatives if code length == 1 and byte length is same
1
expand_case_fold_string(Node* node, regex_t* reg) { #define THRESHOLD_CASE_FOLD_ALT_FOR_EXPANSION 8 int r, n, len, alt_num; UChar *start, *end, *p; Node *top_root, *root, *snode, *prev_node; OnigCaseFoldCodeItem items[ONIGENC_GET_CASE_FOLD_CODES_MAX_NUM]; StrNode* sn = STR_(node); if (NODE_STRING_IS_AMBI...
183402285676240178400514858197717953400
regcomp.c
30592731921158278474590718116243340454
CWE-125
CVE-2019-19246
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-19246
437,291
oniguruma
4d461376bd85e7994835677b2ff453a43c49cd28
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/4d461376bd85e7994835677b2ff453a43c49cd28
don't expand string case folds to alternatives if code length == 1 and byte length is same
0
expand_case_fold_string(Node* node, regex_t* reg) { #define THRESHOLD_CASE_FOLD_ALT_FOR_EXPANSION 8 int r, n, len, alt_num; int is_ambig, fold_len; UChar *start, *end, *p; UChar* foldp; Node *top_root, *root, *snode, *prev_node; OnigCaseFoldCodeItem items[ONIGENC_GET_CASE_FOLD_CODES_MAX_NUM]; UChar buf[...
98258741045227921109976574238500358148
regcomp.c
65059023969392718812527129333061905098
CWE-125
CVE-2019-19246
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-19246
210,570
radare2
d4ce40b516ffd70cf2e9e36832d8de139117d522
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522
Fix oobread in symbols header parsing ##bin
1
static RCoreSymCacheElement *parseDragons(RBinFile *bf, RBuffer *buf, int off, int bits, R_OWN char *file_name) { D eprintf ("Dragons at 0x%x\n", off); ut64 size = r_buf_size (buf); if (off >= size) { return NULL; } size -= off; if (!size) { return NULL; } ut8 *b = malloc (size); if (!b) { return NULL; ...
12354681142783714645575373162879180963
bin_symbols.c
5185444036263415559996433677051676690
CWE-787
CVE-2022-1061
Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.
https://nvd.nist.gov/vuln/detail/CVE-2022-1061
437,671
radare2
d4ce40b516ffd70cf2e9e36832d8de139117d522
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522
Fix oobread in symbols header parsing ##bin
0
static RCoreSymCacheElement *parseDragons(RBinFile *bf, RBuffer *buf, int off, int bits, R_OWN char *file_name) { D eprintf ("Dragons at 0x%x\n", off); st64 size = r_buf_size (buf); if (off >= size) { return NULL; } size -= off; if (!size) { return NULL; } if (size < 32) { return NULL; } ut8 *b = malloc...
161522561097046138638560232136347291203
bin_symbols.c
78009235824912653993940702914741768463
CWE-787
CVE-2022-1061
Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.
https://nvd.nist.gov/vuln/detail/CVE-2022-1061
210,669
ImageMagick6
210474b2fac6a661bfa7ed563213920e93e76395
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/210474b2fac6a661bfa7ed563213920e93e76395
Fix ultra rare but potential memory-leak
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; IndexPacket index; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; register IndexPacket *indexes; register ...
30229592861865697728644210229360552083
bmp.c
87642086170701008397384161090320956088
CWE-401
CVE-2019-13133
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13133
439,114
ImageMagick6
210474b2fac6a661bfa7ed563213920e93e76395
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/210474b2fac6a661bfa7ed563213920e93e76395
Fix ultra rare but potential memory-leak
0
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; IndexPacket index; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; register IndexPacket *indexes; register ...
31482023248196761538245576709415402386
bmp.c
138018406162232274943459037643327051251
CWE-401
CVE-2019-13133
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13133
210,700
squashfs-tools
79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
Unsquashfs: fix write outside destination directory exploit An issue on Github (https://github.com/plougher/squashfs-tools/issues/72) shows how some specially crafted Squashfs filesystems containing invalid file names (with '/' and ..) can cause Unsquashfs to write files outside of the destination directory. This com...
1
static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset, struct inode **i) { squashfs_dir_header_2 dirh; char buffer[sizeof(squashfs_dir_entry_2) + SQUASHFS_NAME_LEN + 1] __attribute__((aligned)); squashfs_dir_entry_2 *dire = (squashfs_dir_entry_2 *) buffer; long long start; int bytes;...
337353141626678057542635238119408606270
None
CWE-22
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination...
https://nvd.nist.gov/vuln/detail/CVE-2021-40153
439,495
squashfs-tools
79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
Unsquashfs: fix write outside destination directory exploit An issue on Github (https://github.com/plougher/squashfs-tools/issues/72) shows how some specially crafted Squashfs filesystems containing invalid file names (with '/' and ..) can cause Unsquashfs to write files outside of the destination directory. This com...
0
static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset, struct inode **i) { squashfs_dir_header_2 dirh; char buffer[sizeof(squashfs_dir_entry_2) + SQUASHFS_NAME_LEN + 1] __attribute__((aligned)); squashfs_dir_entry_2 *dire = (squashfs_dir_entry_2 *) buffer; long long start; int bytes;...
199340706190975735867110978341140950924
None
CWE-22
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination...
https://nvd.nist.gov/vuln/detail/CVE-2021-40153
210,701
squashfs-tools
79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
Unsquashfs: fix write outside destination directory exploit An issue on Github (https://github.com/plougher/squashfs-tools/issues/72) shows how some specially crafted Squashfs filesystems containing invalid file names (with '/' and ..) can cause Unsquashfs to write files outside of the destination directory. This com...
1
static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset, struct inode **i) { squashfs_dir_header_3 dirh; char buffer[sizeof(squashfs_dir_entry_3) + SQUASHFS_NAME_LEN + 1] __attribute__((aligned)); squashfs_dir_entry_3 *dire = (squashfs_dir_entry_3 *) buffer; long long start; int bytes;...
116402969943084287107249411216213408317
None
CWE-22
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination...
https://nvd.nist.gov/vuln/detail/CVE-2021-40153
439,495
squashfs-tools
79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
Unsquashfs: fix write outside destination directory exploit An issue on Github (https://github.com/plougher/squashfs-tools/issues/72) shows how some specially crafted Squashfs filesystems containing invalid file names (with '/' and ..) can cause Unsquashfs to write files outside of the destination directory. This com...
0
static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset, struct inode **i) { squashfs_dir_header_2 dirh; char buffer[sizeof(squashfs_dir_entry_2) + SQUASHFS_NAME_LEN + 1] __attribute__((aligned)); squashfs_dir_entry_2 *dire = (squashfs_dir_entry_2 *) buffer; long long start; int bytes;...
199340706190975735867110978341140950924
None
CWE-22
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination...
https://nvd.nist.gov/vuln/detail/CVE-2021-40153
210,702
squashfs-tools
79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
Unsquashfs: fix write outside destination directory exploit An issue on Github (https://github.com/plougher/squashfs-tools/issues/72) shows how some specially crafted Squashfs filesystems containing invalid file names (with '/' and ..) can cause Unsquashfs to write files outside of the destination directory. This com...
1
static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset, struct inode **i) { struct squashfs_dir_header dirh; char buffer[sizeof(struct squashfs_dir_entry) + SQUASHFS_NAME_LEN + 1] __attribute__((aligned)); struct squashfs_dir_entry *dire = (struct squashfs_dir_entry *) buffer; long lon...
154561395254122138545216205310820189651
None
CWE-22
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination...
https://nvd.nist.gov/vuln/detail/CVE-2021-40153
439,500
squashfs-tools
79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
Unsquashfs: fix write outside destination directory exploit An issue on Github (https://github.com/plougher/squashfs-tools/issues/72) shows how some specially crafted Squashfs filesystems containing invalid file names (with '/' and ..) can cause Unsquashfs to write files outside of the destination directory. This com...
0
static struct dir *squashfs_opendir(unsigned int block_start, unsigned int offset, struct inode **i) { struct squashfs_dir_header dirh; char buffer[sizeof(struct squashfs_dir_entry) + SQUASHFS_NAME_LEN + 1] __attribute__((aligned)); struct squashfs_dir_entry *dire = (struct squashfs_dir_entry *) buffer; long lon...
43120172755872228262829058526345637532
None
CWE-22
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination...
https://nvd.nist.gov/vuln/detail/CVE-2021-40153
210,866
xserver
144849ea27230962227e62a943b399e2ab304787
http://gitweb.freedesktop.org/?p=xorg/xserver
https://gitlab.freedesktop.org/xorg/xserver/-/commit/144849ea27230962227e62a943b399e2ab304787
Fix XkbSelectEvents() integer underflow CVE-2020-14361 ZDI-CAN 11573 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
1
SProcXkbSelectEvents(ClientPtr client) { REQUEST(xkbSelectEventsReq); swaps(&stuff->length); REQUEST_AT_LEAST_SIZE(xkbSelectEventsReq); swaps(&stuff->deviceSpec); swaps(&stuff->affectWhich); swaps(&stuff->clear); swaps(&stuff->selectAll); swaps(&stuff->affectMap); swaps(&stuff->map)...
49390769000512777763270194535836546170
xkbSwap.c
248954015122387054723435955727908433288
CWE-191
CVE-2020-14361
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-14361
441,822
xserver
144849ea27230962227e62a943b399e2ab304787
http://gitweb.freedesktop.org/?p=xorg/xserver
https://gitlab.freedesktop.org/xorg/xserver/-/commit/144849ea27230962227e62a943b399e2ab304787
Fix XkbSelectEvents() integer underflow CVE-2020-14361 ZDI-CAN 11573 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
0
SProcXkbSelectEvents(ClientPtr client) { REQUEST(xkbSelectEventsReq); swaps(&stuff->length); REQUEST_AT_LEAST_SIZE(xkbSelectEventsReq); swaps(&stuff->deviceSpec); swaps(&stuff->affectWhich); swaps(&stuff->clear); swaps(&stuff->selectAll); swaps(&stuff->affectMap); swaps(&stuff->map)...
168019691135253524576440591667545390332
xkbSwap.c
269646087598713036939088933146683136630
CWE-191
CVE-2020-14361
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-14361
210,887
qemu
1caff0340f49c93d535c6558a5138d20d475315c
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=1caff0340f49c93d535c6558a5138d20d475315c
e1000: switch to use qemu_receive_packet() for loopback This patch switches to use qemu_receive_packet() which can detect reentrancy and return early. This is intended to address CVE-2021-3416. Cc: Prasad J Pandit <ppandit@redhat.com> Cc: qemu-stable@nongnu.org Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>...
1
e1000_send_packet(E1000State *s, const uint8_t *buf, int size) { static const int PTCregs[6] = { PTC64, PTC127, PTC255, PTC511, PTC1023, PTC1522 }; NetClientState *nc = qemu_get_queue(s->nic); if (s->phy_reg[PHY_CTRL] & MII_CR_LOOPBACK) { nc->info->receive(nc, bu...
230013883840968138268073793174320435209
e1000.c
176409209781362413917058775514144703306
CWE-835
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
442,189
qemu
1caff0340f49c93d535c6558a5138d20d475315c
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=1caff0340f49c93d535c6558a5138d20d475315c
e1000: switch to use qemu_receive_packet() for loopback This patch switches to use qemu_receive_packet() which can detect reentrancy and return early. This is intended to address CVE-2021-3416. Cc: Prasad J Pandit <ppandit@redhat.com> Cc: qemu-stable@nongnu.org Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>...
0
e1000_send_packet(E1000State *s, const uint8_t *buf, int size) { static const int PTCregs[6] = { PTC64, PTC127, PTC255, PTC511, PTC1023, PTC1522 }; NetClientState *nc = qemu_get_queue(s->nic); if (s->phy_reg[PHY_CTRL] & MII_CR_LOOPBACK) { qemu_receive_packet(nc, ...
300536712775088152847906693971285564175
e1000.c
47410790699069024700445146821057200888
CWE-835
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
210,910
vim
de05bb25733c3319e18dca44e9b59c6ee389eb26
https://github.com/vim/vim
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
patch 8.2.4074: going over the end of NameBuff Problem: Going over the end of NameBuff. Solution: Check length when appending a space.
1
win_redr_status(win_T *wp, int ignore_pum UNUSED) { int row; char_u *p; int len; int fillchar; int attr; int this_ru_col; static int busy = FALSE; // It's possible to get here recursively when 'statusline' (indirectly) // invokes ":redrawstatus". Simply ignore the call then. ...
276232884514343858652101986950507308822
drawscreen.c
10568928391803251582913255951861880853
CWE-200
CVE-2022-0213
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2022-0213
442,959
vim
de05bb25733c3319e18dca44e9b59c6ee389eb26
https://github.com/vim/vim
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
patch 8.2.4074: going over the end of NameBuff Problem: Going over the end of NameBuff. Solution: Check length when appending a space.
0
win_redr_status(win_T *wp, int ignore_pum UNUSED) { int row; char_u *p; int len; int fillchar; int attr; int this_ru_col; static int busy = FALSE; // It's possible to get here recursively when 'statusline' (indirectly) // invokes ":redrawstatus". Simply ignore the call then. ...
176741267087496295201275228908142268974
drawscreen.c
281263511995685251557666010606597186752
CWE-200
CVE-2022-0213
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2022-0213
211,090
cifs-utils
f6eae44a3d05b6515a59651e6bed8b6dde689aec
https://github.com/piastry/cifs-utils
http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=f6eae44a3d05b6515a59651e6bed8b6dde689aec
mtab: handle ENOSPC/EFBIG condition properly when altering mtab It's possible that when mount.cifs goes to append the mtab that there won't be enough space to do so, and the mntent won't be appended to the file in its entirety. Add a my_endmntent routine that will fflush and then fsync the FILE if that succeeds. If e...
1
add_mtab(char *devname, char *mountpoint, unsigned long flags, const char *fstype) { int rc = 0; uid_t uid; char *mount_user = NULL; struct mntent mountent; FILE *pmntfile; sigset_t mask, oldmask; uid = getuid(); if (uid != 0) mount_user = getusername(uid); /* * Set the real uid to the effective uid. Thi...
273553685691100796690999653932620048883
mount.cifs.c
178835896677030263209716239403402725405
CWE-20
CVE-2011-1678
smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_F...
https://nvd.nist.gov/vuln/detail/CVE-2011-1678
444,900
cifs-utils
f6eae44a3d05b6515a59651e6bed8b6dde689aec
https://github.com/piastry/cifs-utils
http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=f6eae44a3d05b6515a59651e6bed8b6dde689aec
mtab: handle ENOSPC/EFBIG condition properly when altering mtab It's possible that when mount.cifs goes to append the mtab that there won't be enough space to do so, and the mntent won't be appended to the file in its entirety. Add a my_endmntent routine that will fflush and then fsync the FILE if that succeeds. If e...
0
add_mtab(char *devname, char *mountpoint, unsigned long flags, const char *fstype) { int rc = 0, tmprc, fd; uid_t uid; char *mount_user = NULL; struct mntent mountent; struct stat statbuf; FILE *pmntfile; sigset_t mask, oldmask; uid = getuid(); if (uid != 0) mount_user = getusername(uid); /* * Set the r...
145620494366436562739751095487223645254
mount.cifs.c
77793306769877718806811810196619780209
CWE-20
CVE-2011-1678
smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_F...
https://nvd.nist.gov/vuln/detail/CVE-2011-1678
211,126
libmobi
612562bc1ea38f1708b044e7a079c47a05b1291d
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/612562bc1ea38f1708b044e7a079c47a05b1291d
Fix: index entry label not being zero-terminated with corrupt input
1
static MOBI_RET mobi_parse_index_entry(MOBIIndx *indx, const MOBIIdxt idxt, const MOBITagx *tagx, const MOBIOrdt *ordt, MOBIBuffer *buf, const size_t curr_number) { if (indx == NULL) { debug_print("%s", "INDX structure not initialized\n"); return MOBI_INIT_FAILED; } const size_t entry_offset...
251371537702901623564985735187675051869
index.c
309095437889005741044332361577356993393
CWE-125
CVE-2022-1987
Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.
https://nvd.nist.gov/vuln/detail/CVE-2022-1987
446,279
libmobi
612562bc1ea38f1708b044e7a079c47a05b1291d
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/612562bc1ea38f1708b044e7a079c47a05b1291d
Fix: index entry label not being zero-terminated with corrupt input
0
static MOBI_RET mobi_parse_index_entry(MOBIIndx *indx, const MOBIIdxt idxt, const MOBITagx *tagx, const MOBIOrdt *ordt, MOBIBuffer *buf, const size_t curr_number) { if (indx == NULL) { debug_print("%s", "INDX structure not initialized\n"); return MOBI_INIT_FAILED; } const size_t entry_offset...
15245136244377426883811242014385645170
index.c
108195340824579059268746364836110051712
CWE-125
CVE-2022-1987
Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.
https://nvd.nist.gov/vuln/detail/CVE-2022-1987