idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
452 | enlightment | 39641e74a560982fbf93f29bf96b37d27803cb56 | https://git.enlightenment.org/legacy/imlib2 | https://git.enlightenment.org/legacy/imlib2.git/commit/?h=v1.4.7&id=39641e74a560982fbf93f29bf96b37d27803cb56 | None | 1 | load(ImlibImage * im, ImlibProgressFunction progress, char progress_granularity,
char immediate_load)
{
static const int intoffset[] = { 0, 4, 2, 1 };
static const int intjump[] = { 8, 8, 4, 2 };
int rc;
DATA32 *ptr;
GifFileType *gif;
GifRowType *r... | 248,094,330,483,319,530,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9762 | imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a GIF image without a colormap. | https://nvd.nist.gov/vuln/detail/CVE-2014-9762 |
453 | savannah | 8b281f83e8516535756f92dbf90940ac44bd45e1 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1 | None | 1 | cid_parse_font_matrix( CID_Face face,
CID_Parser* parser )
{
CID_FaceDict dict;
FT_Face root = (FT_Face)&face->root;
FT_Fixed temp[6];
FT_Fixed temp_scale;
if ( parser->num_dict >= 0 && parser->num_dict < face->cid.num_dicts )
{
FT_Mat... | 228,135,000,173,489,470,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9746 | The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2014-9746 |
454 | savannah | 8b281f83e8516535756f92dbf90940ac44bd45e1 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1 | None | 1 | t1_parse_font_matrix( T1_Face face,
T1_Loader loader )
{
T1_Parser parser = &loader->parser;
FT_Matrix* matrix = &face->type1.font_matrix;
FT_Vector* offset = &face->type1.font_offset;
FT_Face root = (FT_Face)&face->root;
FT_Fixed temp[6];
FT_Fixed ... | 46,188,906,777,019,520,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9746 | The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2014-9746 |
455 | savannah | 8b281f83e8516535756f92dbf90940ac44bd45e1 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1 | None | 1 | t42_parse_font_matrix( T42_Face face,
T42_Loader loader )
{
T42_Parser parser = &loader->parser;
FT_Matrix* matrix = &face->type1.font_matrix;
FT_Vector* offset = &face->type1.font_offset;
FT_Face root = (FT_Face)&face->root;
FT_Fixed temp[6];
FT_F... | 80,677,870,207,684,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9746 | The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2014-9746 |
456 | enlightment | c94d83ccab15d5ef02f88d42dce38ed3f0892882 | https://git.enlightenment.org/legacy/imlib2 | https://git.enlightenment.org/legacy/imlib2.git/commit/?id=c94d83ccab15d5ef02f88d42dce38ed3f0892882 | None | 1 | __imlib_Ellipse_DrawToData(int xc, int yc, int a, int b, DATA32 color,
DATA32 * dst, int dstw, int clx, int cly, int clw,
int clh, ImlibOp op, char dst_alpha, char blend)
{
ImlibPointDrawFunction pfunc;
int xx, yy, x, y, prev_x, prev_y, ty, by,... | 155,577,364,624,288,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2011-5326 | imlib2 before 1.4.9 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) by drawing a 2x1 ellipse. | https://nvd.nist.gov/vuln/detail/CVE-2011-5326 |
457 | openssl | db82b8f9bd432a59aea8e1014694e15fc457c2bb | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=db82b8f9bd432a59aea8e1014694e15fc457c2bb | Bug fix for 64 bit HP-UX.
Submitted by: Karsten Spang <ks@bellesystems.com> | 1 | RSA *RSA_generate_key(int bits, unsigned long e_value,
void (*callback)(int,int,void *), void *cb_arg)
{
RSA *rsa=NULL;
BIGNUM *r0=NULL,*r1=NULL,*r2=NULL,*r3=NULL,*tmp;
int bitsp,bitsq,ok= -1,n=0,i;
BN_CTX *ctx=NULL,*ctx2=NULL;
ctx=BN_CTX_new();
if (ctx == NULL) goto err;
ctx2=BN_CTX_new();
if (ctx2 == ... | 270,513,867,548,826,430,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2000-1254 | crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms. | https://nvd.nist.gov/vuln/detail/CVE-2000-1254 |
460 | gnupg | 9010d1576e278a4274ad3f4aa15776c28f6ba965 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965 | None | 1 | _gcry_ecc_ecdsa_sign (gcry_mpi_t input, ECC_secret_key *skey,
gcry_mpi_t r, gcry_mpi_t s,
int flags, int hashalgo)
{
gpg_err_code_t rc = 0;
int extraloops = 0;
gcry_mpi_t k, dr, sum, k_1, x;
mpi_point_struct I;
gcry_mpi_t hash;
const void *abuf;
unsigned int a... | 208,238,798,261,774,630,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-0495 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA... | https://nvd.nist.gov/vuln/detail/CVE-2018-0495 |
461 | busybox | 352f79acbd759c14399e39baef21fc4ffe180ac2 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 | udhcpc: fix OPTION_6RD parsing (could overflow its malloced buffer)
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 1 | static NOINLINE char *xmalloc_optname_optval(uint8_t *option, const struct dhcp_optflag *optflag, const char *opt_name)
{
unsigned upper_length;
int len, type, optlen;
char *dest, *ret;
/* option points to OPT_DATA, need to go back to get OPT_LEN */
len = option[-OPT_DATA + OPT_LEN];
type = optflag->flags & OP... | 126,744,712,125,939,490,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2148 | Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. | https://nvd.nist.gov/vuln/detail/CVE-2016-2148 |
462 | libbsd | c8f0723d2b4520bdd6b9eb7c3e7976de726d7ff7 | https://gitlab.freedesktop.org/libbsd/libbsd | https://cgit.freedesktop.org/libbsd/commit/?id=c8f0723d2b4520bdd6b9eb7c3e7976de726d7ff7 | Fix heap buffer overflow in fgetwln()
In the function fgetwln() there's a 4 byte heap overflow.
There is a while loop that has this check to see whether there's still
enough space in the buffer:
if (!fb->len || wused > fb->len) {
If this is true more memory gets allocated. However this test won't be
true if wused... | 1 | fgetwln(FILE *stream, size_t *lenp)
{
struct filewbuf *fb;
wint_t wc;
size_t wused = 0;
/* Try to diminish the possibility of several fgetwln() calls being
* used on different streams, by using a pool of buffers per file. */
fb = &fb_pool[fb_pool_cur];
if (fb->fp != stream && fb->fp != NULL) {
fb_pool_cur++;... | 111,742,657,801,644,460,000,000,000,000,000,000,000 | fgetwln.c | 917,190,743,564,002,700,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2090 | Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2 allows attackers to have unspecified impact via unknown vectors, which trigger a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-2090 |
466 | openssl | 197e0ea817ad64820789d86711d55ff50d71f631 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631 | Fix for TLS record tampering bug CVE-2013-4353 | 1 | static void ssl3_take_mac(SSL *s)
{
const char *sender;
int slen;
if (s->state & SSL_ST_CONNECT)
{
sender=s->method->ssl3_enc->server_finished_label;
sender=s->method->ssl3_enc->client_finished_label;
slen=s->method->ssl3_enc->client_finished_label_len... | 122,161,343,720,297,890,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4353 | The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. | https://nvd.nist.gov/vuln/detail/CVE-2013-4353 |
467 | samba | b9b9f6738fba5c32e87cb9c36b358355b444fb9b | https://github.com/samba-team/samba | https://git.samba.org/?p=ctdb.git;a=commitdiff;h=b9b9f6738fba5c32e87cb9c36b358355b444fb9b | None | 1 | static int ctdb_tcp_listen_automatic(struct ctdb_context *ctdb)
{
struct ctdb_tcp *ctcp = talloc_get_type(ctdb->private_data,
struct ctdb_tcp);
ctdb_sock_addr sock;
int lock_fd, i;
const char *lock_path = "/tmp/.ctdb_socket_lock";
struct f... | 42,617,125,390,009,840,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | https://nvd.nist.gov/vuln/detail/CVE-2013-4159 |
468 | savannah | f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=f6f9c48fb40b8a1e8218799724b0b61a7161eb1d | None | 1 | get_cdtext_generic (void *p_user_data)
{
generic_img_private_t *p_env = p_user_data;
uint8_t *p_cdtext_data = NULL;
size_t len;
if (!p_env) return NULL;
if (p_env->b_cdtext_error) return NULL;
if (NULL == p_env->cdtext) {
p_cdtext_data = read_cdtext_generic (p_env);
if (NULL != p_cdtext_data) {... | 291,782,179,769,331,630,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
484 | ghostscript | 2fc463d0efbd044a8232611f0898eeb12b72a970 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=2fc463d0e | None | 1 | file_continue(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
es_ptr pscratch = esp - 2;
file_enum *pfen = r_ptr(esp - 1, file_enum);
int devlen = esp[-3].value.intval;
gx_io_device *iodev = r_ptr(esp - 4, gx_io_device);
uint len = r_size(pscratch);
uint code;
if (len < devlen)
return_erro... | 235,592,933,251,983,500,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-15652 | Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of ... | https://nvd.nist.gov/vuln/detail/CVE-2017-15652 |
493 | busybox | 4e314faa0aecb66717418e9a47a4451aec59262b | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b | modprobe,rmmod: reject module names with slashes
function old new delta
add_probe 86 113 +27
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 1 | static void add_probe(const char *name)
{
struct module_entry *m;
m = get_or_add_modentry(name);
if (!(option_mask32 & (OPT_REMOVE | OPT_SHOW_DEPS))
&& (m->flags & MODULE_FLAG_LOADED)
&& strncmp(m->modname, "symbol:", 7) == 0
) {
G.need_symbols = 1;
}
}
| 226,438,009,548,517,160,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9645 | The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. | https://nvd.nist.gov/vuln/detail/CVE-2014-9645 |
511 | libxfont | 5bf703700ee4a5d6eae20da07cb7a29369667aef | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=5bf703700ee4a5d6eae20da07cb7a29369667aef | None | 1 | CatalogueRescan (FontPathElementPtr fpe)
{
CataloguePtr cat = fpe->private;
char link[MAXFONTFILENAMELEN];
char dest[MAXFONTFILENAMELEN];
char *attrib;
FontPathElementPtr subfpe;
struct stat statbuf;
const char *path;
DIR *dir;
struct dirent *entry;
int len;
int pa... | 320,948,107,529,517,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2007-5199 | A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2007-5199 |
512 | savannah | 57cbb8c148999ba8f14ed53435fc071ac9953afd | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd | None | 1 | tt_cmap14_validate( FT_Byte* table,
FT_Validator valid )
{
FT_Byte* p;
FT_ULong length;
FT_ULong num_selectors;
if ( table + 2 + 4 + 4 > valid->limit )
FT_INVALID_TOO_SHORT;
p = table + 2;
length = TT_NEXT_ULONG( p );
num_selecto... | 150,741,055,389,882,230,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9383 | FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c. | https://nvd.nist.gov/vuln/detail/CVE-2015-9383 |
513 | savannah | db5a4a9ae7b0048f033361744421da8569642f73 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73 | None | 1 | ps_parser_skip_PS_token( PS_Parser parser )
{
/* Note: PostScript allows any non-delimiting, non-whitespace */
/* character in a name (PS Ref Manual, 3rd ed, p31). */
/* PostScript delimiters are (, ), <, >, [, ], {, }, /, and %. */
FT_Byte* cur = parser->cursor;
... | 33,447,871,913,940,490,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9382 | FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation. | https://nvd.nist.gov/vuln/detail/CVE-2015-9382 |
514 | savannah | e3058617f384cb6709f3878f753fa17aca9e3a30 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30 | None | 1 | T1_Get_Private_Dict( T1_Parser parser,
PSAux_Service psaux )
{
FT_Stream stream = parser->stream;
FT_Memory memory = parser->root.memory;
FT_Error error = FT_Err_Ok;
FT_ULong size;
if ( parser->in_pfb )
{
/* in the case of the PFB format, the priva... | 338,869,587,383,884,150,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2015-9290 | In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again. | https://nvd.nist.gov/vuln/detail/CVE-2015-9290 |
515 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 1 | eXosip_init (struct eXosip_t *excontext)
{
osip_t *osip;
int i;
memset (excontext, 0, sizeof (eXosip_t));
excontext->dscp = 0x1A;
snprintf (excontext->ipv4_for_gateway, 256, "%s", "217.12.3.11");
snprintf (excontext->ipv6_for_gateway, 256, "%s", "2001:638:500:101:2e0:81ff:fe24:37c6");
#ifdef WIN32
/* ... | 238,204,468,281,732,100,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
528 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 1 | SProcXIBarrierReleasePointer(ClientPtr client)
{
xXIBarrierReleasePointerInfo *info;
REQUEST(xXIBarrierReleasePointerReq);
int i;
swaps(&stuff->length);
REQUEST_AT_LEAST_SIZE(xXIBarrierReleasePointerReq);
swapl(&stuff->num_barriers);
REQUEST_FIXED_SIZE(xXIBarrierReleasePointerReq, stuf... | 175,285,775,827,241,400,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
529 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 1 | ProcXIChangeHierarchy(ClientPtr client)
{
xXIAnyHierarchyChangeInfo *any;
size_t len; /* length of data remaining in request */
int rc = Success;
int flags[MAXDEVICES] = { 0 };
REQUEST(xXIChangeHierarchyReq);
REQUEST_AT_LEAST_SIZE(xXIChangeHierarchyReq);
if (!stuff->num_changes)
... | 273,466,064,398,137,730,000,000,000,000,000,000,000 | xichangehierarchy.c | 8,928,712,519,864,954,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
530 | xserver | 4ca68b878e851e2136c234f40a25008297d8d831 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831 | dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
v2: Protect against integer overflow (Alan Coopersmith)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off... | 1 | ProcDbeGetVisualInfo(ClientPtr client)
{
REQUEST(xDbeGetVisualInfoReq);
DbeScreenPrivPtr pDbeScreenPriv;
xDbeGetVisualInfoReply rep;
Drawable *drawables;
DrawablePtr *pDrawables = NULL;
register int i, j, rc;
register int count; /* number of visual infos in reply */
register int ... | 253,695,885,025,975,700,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12177 |
531 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 1 | ProcEstablishConnection(ClientPtr client)
{
const char *reason;
char *auth_proto, *auth_string;
xConnClientPrefix *prefix;
REQUEST(xReq);
prefix = (xConnClientPrefix *) ((char *) stuff + sz_xReq);
auth_proto = (char *) prefix + sz_xConnClientPrefix;
auth_string = auth_proto + pad_to_int... | 25,271,822,103,545,985,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
532 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 1 | secret_core_crt (gcry_mpi_t M, gcry_mpi_t C,
gcry_mpi_t D, unsigned int Nlimbs,
gcry_mpi_t P, gcry_mpi_t Q, gcry_mpi_t U)
{
gcry_mpi_t m1 = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mpi_t m2 = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mpi_t h = mpi_alloc_secure ( Nlimbs + 1 );
/* m... | 284,361,140,638,249,130,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
533 | libICE | ff5e59f32255913bb1cdf51441b98c9107ae165b | https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b | https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b | None | 1 | IceGenerateMagicCookie (
int len
)
{
char *auth;
#ifndef HAVE_ARC4RANDOM_BUF
long ldata[2];
int seed;
int value;
int i;
#endif
if ((auth = malloc (len + 1)) == NULL)
return (NULL);
#ifdef HAVE_ARC4RANDOM_BUF
arc4random_buf(auth, len);
#else
#ifdef ITIMER_REAL
... | 20,612,687,529,230,170,000,000,000,000,000,000,000 | None | null | [
"CWE-331"
] | CVE-2017-2626 | It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. | https://nvd.nist.gov/vuln/detail/CVE-2017-2626 |
534 | libXdmcp | 0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | None | 1 | XdmcpGenerateKey (XdmAuthKeyPtr key)
{
#ifndef HAVE_ARC4RANDOM_BUF
long lowbits, highbits;
srandom ((int)getpid() ^ time((Time_t *)0));
highbits = random ();
highbits = random ();
getbits (lowbits, key->data);
getbits (highbits, key->data + 4);
#else
arc4random_buf(key->data, 8);... | 156,663,800,142,374,230,000,000,000,000,000,000,000 | None | null | [
"CWE-320"
] | CVE-2017-2625 | It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. | https://nvd.nist.gov/vuln/detail/CVE-2017-2625 |
535 | savannah | a0d7fe4589651c64bd16ddaaa634030bb0455866 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866 | None | 1 | pch_write_line (lin line, FILE *file)
{
bool after_newline = p_line[line][p_len[line] - 1] == '\n';
if (! fwrite (p_line[line], sizeof (*p_line[line]), p_len[line], file))
write_fatal ();
return after_newline;
}
| 109,748,454,555,121,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10713 | An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10713 |
540 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 1 | jbig2_decode_gray_scale_image(Jbig2Ctx *ctx, Jbig2Segment *segment,
const byte *data, const size_t size,
bool GSMMR, uint32_t GSW, uint32_t GSH,
uint32_t GSBPP, bool GSUSESKIP, Jbig2Image *GSKIP, int GSTEMPLATE, Jbig2ArithCx *GB_s... | 304,560,407,984,195,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
558 | openssl | 8aed2a7548362e88e84a7feb795a3a97e8395008 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008 | Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org>
(cherry picked from commit f54be179aa4cbbd944728771d7d59ed588158a12) | 1 | void EC_GROUP_clear_free(EC_GROUP *group)
{
if (!group) return;
if (group->meth->group_clear_finish != 0)
group->meth->group_clear_finish(group);
else if (group->meth->group_finish != 0)
group->meth->group_finish(group);
EC_EX_DATA_clear_free_all_data(&group->extra_data);
if (group->generator != NULL)
... | 83,588,821,557,112,970,000,000,000,000,000,000,000 | None | null | [
"CWE-320"
] | CVE-2016-7056 | A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys. | https://nvd.nist.gov/vuln/detail/CVE-2016-7056 |
559 | busybox | 1de25a6e87e0e627aa34298105a3d17c60a1f44e | http://git.busybox.net/busybox | http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e | unzip: test for bad archive SEGVing
function old new delta
huft_build 1296 1300 +4
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 1 | static int huft_build(const unsigned *b, const unsigned n,
const unsigned s, const unsigned short *d,
const unsigned char *e, huft_t **t, unsigned *m)
{
unsigned a; /* counter for codes of length k */
unsigned c[BMAX + 1]; /* bit length count table */
unsigned eob_len; /* length of end-of-b... | 44,886,300,504,321,350,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-9261 | huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. | https://nvd.nist.gov/vuln/detail/CVE-2015-9261 |
560 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 1 | create_response(const char *nurl, const char *method, unsigned int *rp_code)
{
char *page, *fpath;
struct MHD_Response *resp = NULL;
if (!strncmp(nurl, URL_BASE_API_1_1, strlen(URL_BASE_API_1_1))) {
resp = create_response_api(nurl, method, rp_code);
} else {
... | 1,938,873,346,208,583,300,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
563 | enlightment | 666df815cd86a50343859bce36c5cf968c5f38b0 | https://git.enlightenment.org/legacy/imlib2 | https://git.enlightenment.org/core/enlightenment.git/commit/?id=666df815cd86a50343859bce36c5cf968c5f38b0 | None | 1 | main(int argc,
char **argv)
{
int i, gn;
int test = 0;
char *action = NULL, *cmd;
char *output = NULL;
#ifdef HAVE_EEZE_MOUNT
Eina_Bool mnt = EINA_FALSE;
const char *act;
#endif
gid_t gid, gl[65536], egid;
for (i = 1; i < argc; i++)
{
if ((!strcmp(argv[i], "-h")) ||
... | 300,699,053,216,122,170,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2014-1845 | An unspecified setuid root helper in Enlightenment before 0.17.6 allows local users to gain privileges by leveraging failure to properly sanitize the environment. | https://nvd.nist.gov/vuln/detail/CVE-2014-1845 |
564 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 1 | pango_glyph_string_set_size (PangoGlyphString *string, gint new_len)
{
g_return_if_fail (new_len >= 0);
while (new_len > string->space)
{
if (string->space == 0)
string->space = 1;
else
string->space *= 2;
if (string->space < 0)
{
g_warning ("glyph string length overflows maximum i... | 263,605,045,719,264,640,000,000,000,000,000,000,000 | glyphstring.c | 149,047,394,354,023,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
566 | memcached | d9cd01ede97f4145af9781d448c62a3318952719 | https://github.com/memcached/memcached | http://github.com/memcached/memcached/commit/d9cd01ede97f4145af9781d448c62a3318952719 | Use strncmp when checking for large ascii multigets. | 1 | static int try_read_command(conn *c) {
assert(c != NULL);
assert(c->rcurr <= (c->rbuf + c->rsize));
assert(c->rbytes > 0);
if (c->protocol == negotiating_prot || c->transport == udp_transport) {
if ((unsigned char)c->rbuf[0] == (unsigned char)PROTOCOL_BINARY_REQ) {
c->protocol = bi... | 41,269,603,813,800,370,000,000,000,000,000,000,000 | memcached.c | 216,347,815,765,977,350,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2010-1152 | memcached.c in memcached before 1.4.3 allows remote attackers to cause a denial of service (daemon hang or crash) via a long line that triggers excessive memory allocation. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2010-1152 |
568 | uzbl | 1958b52d41cba96956dc1995660de49525ed1047 | http://github.com/Dieterbe/uzbl | http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047 | disable Uzbl javascript object because of security problem. | 1 | eval_js(WebKitWebView * web_view, gchar *script, GString *result) {
WebKitWebFrame *frame;
JSGlobalContextRef context;
JSObjectRef globalobject;
JSStringRef var_name;
JSStringRef js_script;
JSValueRef js_result;
JSStringRef js_result_string;
size_t js_result_size;
js_init();
... | 251,201,670,477,899,880,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2010-0011 | The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code. | https://nvd.nist.gov/vuln/detail/CVE-2010-0011 |
569 | FFmpeg | 8312e3fc9041027a33c8bc667bb99740fdf41dd5 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8312e3fc9041027a33c8bc667bb99740fdf41dd5 | Do not attempt to decode APE file with no frames
This fixes invalid reads/writes with this sample:
http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt | 1 | static int ape_read_header(AVFormatContext * s, AVFormatParameters * ap)
{
AVIOContext *pb = s->pb;
APEContext *ape = s->priv_data;
AVStream *st;
uint32_t tag;
int i;
int total_blocks;
int64_t pts;
/* TODO: Skip any leading junk such as id3v2 tags */
ape->junklength = 0;
tag = ... | 4,670,505,959,256,340,000,000,000,000,000,000,000 | ape.c | 314,360,533,481,047,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-2161 | The ape_read_header function in ape.c in libavformat in FFmpeg before 0.5.4, as used in MPlayer, VideoLAN VLC media player, and other products, allows remote attackers to cause a denial of service (application crash) via an APE (aka Monkey's Audio) file that contains a header but no frames. | https://nvd.nist.gov/vuln/detail/CVE-2011-2161 |
570 | nbd | 3ef52043861ab16352d49af89e048ba6339d6df8 | https://github.com/yoe/nbd | https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 | Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 1 | int mainloop(CLIENT *client) {
struct nbd_request request;
struct nbd_reply reply;
gboolean go_on=TRUE;
#ifdef DODBG
int i = 0;
#endif
negotiate(client->net, client, NULL);
DEBUG("Entering request loop!\n");
reply.magic = htonl(NBD_REPLY_MAGIC);
reply.error = 0;
while (go_on) {
char buf[BUFSIZE];
size_t le... | 21,610,058,009,013,440,000,000,000,000,000,000,000 | nbd-server.c | 204,775,428,507,829,950,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | https://nvd.nist.gov/vuln/detail/CVE-2011-0530 |
573 | linux | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 1 | static void tcp_illinois_info(struct sock *sk, u32 ext,
struct sk_buff *skb)
{
const struct illinois *ca = inet_csk_ca(sk);
if (ext & (1 << (INET_DIAG_VEGASINFO - 1))) {
struct tcpvegas_info info = {
.tcpv_enabled = 1,
.tcpv_rttcnt = ca->cnt_rtt,
.tcpv_minrtt = ca->base_rtt,
};
u64 t = ca-... | 162,920,631,819,149,100,000,000,000,000,000,000,000 | tcp_illinois.c | 159,370,893,635,524,200,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-4565 | The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. | https://nvd.nist.gov/vuln/detail/CVE-2012-4565 |
579 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 1 | static int do_siocgstamp(struct net *net, struct socket *sock,
unsigned int cmd, void __user *up)
{
mm_segment_t old_fs = get_fs();
struct timeval ktv;
int err;
set_fs(KERNEL_DS);
err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
set_fs(old_fs);
if (!err)
err = compat_put_timeval(up, &ktv);
... | 324,785,292,477,380,530,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
580 | linux | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | 1 | static int do_siocgstampns(struct net *net, struct socket *sock,
unsigned int cmd, void __user *up)
{
mm_segment_t old_fs = get_fs();
struct timespec kts;
int err;
set_fs(KERNEL_DS);
err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
set_fs(old_fs);
if (!err)
err = compat_put_timespec(up, &kts... | 301,299,746,212,079,000,000,000,000,000,000,000,000 | socket.c | 340,153,205,578,084,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-4467 | The (1) do_siocgstamp and (2) do_siocgstampns functions in net/socket.c in the Linux kernel before 3.5.4 use an incorrect argument order, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (system crash) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-4467 |
620 | linux | f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9 | [PATCH] xacct_add_tsk: fix pure theoretical ->mm use-after-free
Paranoid fix. The task can free its ->mm after the 'if (p->mm)' check.
Signed-off-by: Oleg Nesterov <oleg@tv-sign.ru>
Cc: Shailabh Nagar <nagar@watson.ibm.com>
Cc: Balbir Singh <balbir@in.ibm.com>
Cc: Jay Lan <jlan@sgi.com>
Signed-off-by: Andrew Morton <... | 1 | void xacct_add_tsk(struct taskstats *stats, struct task_struct *p)
{
/* convert pages-jiffies to Mbyte-usec */
stats->coremem = jiffies_to_usecs(p->acct_rss_mem1) * PAGE_SIZE / MB;
stats->virtmem = jiffies_to_usecs(p->acct_vm_mem1) * PAGE_SIZE / MB;
if (p->mm) {
/* adjust to KB unit */
stats->hiwater_rss ... | 312,814,071,675,674,300,000,000,000,000,000,000,000 | tsacct.c | 16,213,253,465,781,030,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-3510 | Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command. | https://nvd.nist.gov/vuln/detail/CVE-2012-3510 |
621 | linux | 06b6a1cf6e776426766298d055bb3991957d90a7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7 | rds: set correct msg_namelen
Jay Fenlason (fenlason@redhat.com) found a bug,
that recvfrom() on an RDS socket can return the contents of random kernel
memory to userspace if it was called with a address length larger than
sizeof(struct sockaddr_in).
rds_recvmsg() also fails to set the addr_len paramater properly befor... | 1 | int rds_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg,
size_t size, int msg_flags)
{
struct sock *sk = sock->sk;
struct rds_sock *rs = rds_sk_to_rs(sk);
long timeo;
int ret = 0, nonblock = msg_flags & MSG_DONTWAIT;
struct sockaddr_in *sin;
struct rds_incoming *inc = NULL;
/* udp_recvmsg(... | 145,358,621,780,894,130,000,000,000,000,000,000,000 | recv.c | 115,527,263,712,618,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-3430 | The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket. | https://nvd.nist.gov/vuln/detail/CVE-2012-3430 |
625 | linux | adee11b2085bee90bd8f4f52123ffb07882d6256 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/adee11b2085bee90bd8f4f52123ffb07882d6256 | udf: Avoid run away loop when partition table length is corrupted
Check provided length of partition table so that (possibly maliciously)
corrupted partition table cannot cause accessing data beyond current buffer.
Signed-off-by: Jan Kara <jack@suse.cz> | 1 | static int udf_load_logicalvol(struct super_block *sb, sector_t block,
struct kernel_lb_addr *fileset)
{
struct logicalVolDesc *lvd;
int i, j, offset;
uint8_t type;
struct udf_sb_info *sbi = UDF_SB(sb);
struct genericPartitionMap *gpm;
uint16_t ident;
struct buffer_head *bh;
int ret = 0;
bh = ... | 69,425,838,954,019,910,000,000,000,000,000,000,000 | super.c | 195,692,247,566,564,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-3400 | Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2012-3400 |
627 | linux | 79549c6dfda0603dba9a70a53467ce62d9335c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 | cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 1 | int copy_creds(struct task_struct *p, unsigned long clone_flags)
{
#ifdef CONFIG_KEYS
struct thread_group_cred *tgcred;
#endif
struct cred *new;
int ret;
if (
#ifdef CONFIG_KEYS
!p->cred->thread_keyring &&
#endif
clone_flags & CLONE_THREAD
) {
p->real_cred = get_cred(p->cred);
get_cred(p->cred);... | 297,010,684,195,110,070,000,000,000,000,000,000,000 | cred.c | 39,275,897,372,619,242,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-2745 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2745 |
629 | linux | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | 1 | int main(void)
{
int fd, len, sock_opt;
int error;
struct cn_msg *message;
struct pollfd pfd;
struct nlmsghdr *incoming_msg;
struct cn_msg *incoming_cn_msg;
struct hv_kvp_msg *hv_msg;
char *p;
char *key_value;
char *key_name;
daemon(1, 0);
openlog("KVP", 0, LOG_USER);
syslog(LOG_INFO, "KVP starting; pid i... | 258,681,515,104,986,800,000,000,000,000,000,000,000 | hv_kvp_daemon.c | 27,462,705,415,646,913,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2669 | The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. | https://nvd.nist.gov/vuln/detail/CVE-2012-2669 |
632 | linux | ed8cd3b2cd61004cab85380c52b1817aca1ca49b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ed8cd3b2cd61004cab85380c52b1817aca1ca49b | drm/i915: fix integer overflow in i915_gem_execbuffer2()
On 32-bit systems, a large args->buffer_count from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 8408c282 ("drm/i915:
First try a normal large kmalloc for the temporary exec bu... | 1 | i915_gem_execbuffer2(struct drm_device *dev, void *data,
struct drm_file *file)
{
struct drm_i915_gem_execbuffer2 *args = data;
struct drm_i915_gem_exec_object2 *exec2_list = NULL;
int ret;
if (args->buffer_count < 1) {
DRM_DEBUG("execbuf2 with %d buffers\n", args->buffer_count);
return -EINVAL;
... | 227,357,713,410,382,230,000,000,000,000,000,000,000 | i915_gem_execbuffer.c | 309,976,810,793,568,370,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2383 | Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a c... | https://nvd.nist.gov/vuln/detail/CVE-2012-2383 |
633 | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 1 | static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
{
struct page *pages[NFS4ACL_MAXPAGES] = {NULL, };
struct nfs_getaclargs args = {
.fh = NFS_FH(inode),
.acl_pages = pages,
.acl_len = buflen,
};
struct nfs_getaclres res = {
.acl_len = buflen,
};
void *resp_buf;
struct ... | 331,883,198,314,548,230,000,000,000,000,000,000,000 | nfs4proc.c | 291,748,450,445,192,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2375 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | https://nvd.nist.gov/vuln/detail/CVE-2012-2375 |
636 | linux | 1bb57e940e1958e40d51f2078f50c3a96a9b2d75 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 | dl2k: Clean up rio_ioctl
The dl2k driver's rio_ioctl call has a few issues:
- No permissions checking
- Implements SIOCGMIIREG and SIOCGMIIREG using the SIOCDEVPRIVATE numbers
- Has a few ioctls that may have been used for debugging at one point
but have no place in the kernel proper.
This patch removes all but the... | 1 | rio_ioctl (struct net_device *dev, struct ifreq *rq, int cmd)
{
int phy_addr;
struct netdev_private *np = netdev_priv(dev);
struct mii_data *miidata = (struct mii_data *) &rq->ifr_ifru;
struct netdev_desc *desc;
int i;
phy_addr = np->phy_addr;
switch (cmd) {
case SIOCDEVPRIVATE:
break;
case SIOCDEVPRI... | 221,960,374,900,390,280,000,000,000,000,000,000,000 | dl2k.c | 98,599,421,759,380,920,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2012-2313 | The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-2313 |
637 | linux | cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc | net: sock: validate data_len before allocating skb in sock_alloc_send_pskb()
We need to validate the number of pages consumed by data_len, otherwise frags
array could be overflowed by userspace. So this patch validate data_len and
return -EMSGSIZE when data_len may occupies more frags than MAX_SKB_FRAGS.
Signed-off-b... | 1 | struct sk_buff *sock_alloc_send_pskb(struct sock *sk, unsigned long header_len,
unsigned long data_len, int noblock,
int *errcode)
{
struct sk_buff *skb;
gfp_t gfp_mask;
long timeo;
int err;
gfp_mask = sk->sk_allocation;
if (gfp_mask & __GFP_WAIT)
gfp_mask |= __GFP_REPEAT;
timeo = soc... | 265,176,515,415,961,300,000,000,000,000,000,000,000 | sock.c | 109,934,911,297,062,120,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-2136 | The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device. | https://nvd.nist.gov/vuln/detail/CVE-2012-2136 |
649 | linux | d52fc5dde171f030170a6cb78034d166b13c9445 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d52fc5dde171f030170a6cb78034d166b13c9445 | fcaps: clear the same personality flags as suid when fcaps are used
If a process increases permissions using fcaps all of the dangerous
personality flags which are cleared for suid apps should also be cleared.
Thus programs given priviledge with fcaps will continue to have address space
randomization enabled even if t... | 1 | int cap_bprm_set_creds(struct linux_binprm *bprm)
{
const struct cred *old = current_cred();
struct cred *new = bprm->cred;
bool effective, has_cap = false;
int ret;
effective = false;
ret = get_file_caps(bprm, &effective, &has_cap);
if (ret < 0)
return ret;
if (!issecure(SECURE_NOROOT)) {
/*
* If the ... | 248,446,296,481,147,620,000,000,000,000,000,000,000 | commoncap.c | 14,606,336,979,415,644,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2012-2123 | The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated... | https://nvd.nist.gov/vuln/detail/CVE-2012-2123 |
652 | linux | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | 1 | static int ext4_fill_flex_info(struct super_block *sb)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_group_desc *gdp = NULL;
ext4_group_t flex_group_count;
ext4_group_t flex_group;
int groups_per_flex = 0;
size_t size;
int i;
sbi->s_log_groups_per_flex = sbi->s_es->s_log_groups_per_flex;
groups... | 274,161,292,744,789,030,000,000,000,000,000,000,000 | super.c | 154,568,347,400,018,350,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2100 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block ... | https://nvd.nist.gov/vuln/detail/CVE-2012-2100 |
655 | linux | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a | [IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 1 | static int xfrm6_tunnel_rcv(struct sk_buff *skb)
{
struct ipv6hdr *iph = ipv6_hdr(skb);
__be32 spi;
spi = xfrm6_tunnel_spi_lookup((xfrm_address_t *)&iph->saddr);
return xfrm6_rcv_spi(skb, spi);
}
| 339,521,390,955,967,240,000,000,000,000,000,000,000 | xfrm6_tunnel.c | 173,432,014,061,318,850,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-1583 | Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-1583 |
673 | linux | 371528caec553785c37f73fa3926ea0de84f986f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f | mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 1 | static void mem_cgroup_usage_unregister_event(struct cgroup *cgrp,
struct cftype *cft, struct eventfd_ctx *eventfd)
{
struct mem_cgroup *memcg = mem_cgroup_from_cont(cgrp);
struct mem_cgroup_thresholds *thresholds;
struct mem_cgroup_threshold_ary *new;
int type = MEMFILE_TYPE(cft->private);
u64 usage;
int i, j, ... | 68,337,715,219,973,270,000,000,000,000,000,000,000 | memcontrol.c | 220,205,693,046,075,100,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2012-1146 | The mem_cgroup_usage_unregister_event function in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact ... | https://nvd.nist.gov/vuln/detail/CVE-2012-1146 |
674 | linux | c8e252586f8d5de906385d8cf6385fee289a825e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e | regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | 1 | static int fill_thread_core_info(struct elf_thread_core_info *t,
const struct user_regset_view *view,
long signr, size_t *total)
{
unsigned int i;
/*
* NT_PRSTATUS is the one special case, because the regset data
* goes into the pr_reg field inside the note contents, rather
* than being the whole not... | 133,523,848,575,813,670,000,000,000,000,000,000,000 | binfmt_elf.c | 160,007,124,444,830,780,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-1097 | The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call... | https://nvd.nist.gov/vuln/detail/CVE-2012-1097 |
675 | linux | 2702b1526c7278c4d65d78de209a465d4de2885e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2702b1526c7278c4d65d78de209a465d4de2885e | kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 1 | static int override_release(char __user *release, int len)
{
int ret = 0;
char buf[65];
if (current->personality & UNAME26) {
char *rest = UTS_RELEASE;
int ndots = 0;
unsigned v;
while (*rest) {
if (*rest == '.' && ++ndots >= 3)
break;
if (!isdigit(*rest) && *rest != '.')
break;
... | 194,389,486,511,445,540,000,000,000,000,000,000,000 | sys.c | 48,185,621,417,220,060,000,000,000,000,000,000,000 | [
"CWE-16"
] | CVE-2012-0957 | The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. | https://nvd.nist.gov/vuln/detail/CVE-2012-0957 |
676 | linux | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/61cc74fbb87af6aa551a06a370590c9bc07e29d9 | block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 1 | void exit_io_context(void)
{
struct io_context *ioc;
task_lock(current);
ioc = current->io_context;
current->io_context = NULL;
task_unlock(current);
if (atomic_dec_and_test(&ioc->nr_tasks)) {
if (ioc->aic && ioc->aic->exit)
ioc->aic->exit(ioc->aic);
cfq_exit(ioc);
put_io_context(ioc);
}
}
| 254,860,370,760,445,170,000,000,000,000,000,000,000 | blk-ioc.c | 39,920,103,338,260,244,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-0879 | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | https://nvd.nist.gov/vuln/detail/CVE-2012-0879 |
678 | suhosin | 73b1968ee30f6d9d2dae497544b910e68e114bfa | https://github.com/stefanesser/suhosin | https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa | Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory) | 1 | char *suhosin_encrypt_single_cookie(char *name, int name_len, char *value, int value_len, char *key TSRMLS_DC)
{
char buffer[4096];
char buffer2[4096];
char *buf = buffer, *buf2 = buffer2, *d, *d_url;
int l;
if (name_len > sizeof(buffer)-2) {
buf = estrndup(name, name_len);
} else {
memcpy(buf, name, ... | 41,838,469,559,935,617,000,000,000,000,000,000,000 | header.c | 22,878,982,287,999,906,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0807 | Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in... | https://nvd.nist.gov/vuln/detail/CVE-2012-0807 |
679 | linux | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | 1 | static void igmp_heard_query(struct in_device *in_dev, struct sk_buff *skb,
int len)
{
struct igmphdr *ih = igmp_hdr(skb);
struct igmpv3_query *ih3 = igmpv3_query_hdr(skb);
struct ip_mc_list *im;
__be32 group = ih->group;
int max_delay;
int mark = 0;
if (len == 8) {
if (ih->code == 0) {
/* Alas, ... | 178,069,013,729,538,920,000,000,000,000,000,000,000 | igmp.c | 318,760,992,718,953,620,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-0207 | The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. | https://nvd.nist.gov/vuln/detail/CVE-2012-0207 |
681 | linux | 802f43594d6e4d2ac61086d239153c17873a0428 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/802f43594d6e4d2ac61086d239153c17873a0428 | None | 1 | static void kiocb_batch_free(struct kiocb_batch *batch)
{
struct kiocb *req, *n;
list_for_each_entry_safe(req, n, &batch->head, ki_batch) {
list_del(&req->ki_batch);
kmem_cache_free(kiocb_cachep, req);
}
}
| 31,800,320,877,295,178,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-0058 | The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management. | https://nvd.nist.gov/vuln/detail/CVE-2012-0058 |
682 | linux | a5cd335165e31db9dbab636fd29895d41da55dd2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2 | drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | 1 | int drm_mode_dirtyfb_ioctl(struct drm_device *dev,
void *data, struct drm_file *file_priv)
{
struct drm_clip_rect __user *clips_ptr;
struct drm_clip_rect *clips = NULL;
struct drm_mode_fb_dirty_cmd *r = data;
struct drm_mode_object *obj;
struct drm_framebuffer *fb;
unsigned flags;
int num_clips;
int ret =... | 108,013,488,907,801,730,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2012-0044 | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2012-0044 |
693 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 1 | static int rose_parse_ccitt(unsigned char *p, struct rose_facilities_struct *facilities, int len)
{
unsigned char l, n = 0;
char callsign[11];
do {
switch (*p & 0xC0) {
case 0x00:
p += 2;
n += 2;
len -= 2;
break;
case 0x40:
p += 3;
n += 3;
len -= 3;
break;
case 0x80:
p ... | 116,021,283,864,279,120,000,000,000,000,000,000,000 | rose_subr.c | 141,742,477,628,029,090,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
695 | linux | be20250c13f88375345ad99950190685eda51eb8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/be20250c13f88375345ad99950190685eda51eb8 | ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | 1 | static int rose_parse_national(unsigned char *p, struct rose_facilities_struct *facilities, int len)
{
unsigned char *pt;
unsigned char l, lg, n = 0;
int fac_national_digis_received = 0;
do {
switch (*p & 0xC0) {
case 0x00:
p += 2;
n += 2;
len -= 2;
break;
case 0x40:
if (*p == FAC_NATIONA... | 145,952,537,291,143,530,000,000,000,000,000,000,000 | rose_subr.c | 141,742,477,628,029,090,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4913 | The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to ... | https://nvd.nist.gov/vuln/detail/CVE-2011-4913 |
700 | linux | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0837e3242c73566fc1c0196b4ec61779c25ffc93 | perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 1 | static void perf_event_interrupt(struct pt_regs *regs)
{
int i;
struct cpu_hw_events *cpuhw = &__get_cpu_var(cpu_hw_events);
struct perf_event *event;
unsigned long val;
int found = 0;
int nmi;
if (cpuhw->n_limited)
freeze_limited_counters(cpuhw, mfspr(SPRN_PMC5),
mfspr(SPRN_PMC6));
perf_read_regs(regs... | 175,304,852,490,672,560,000,000,000,000,000,000,000 | perf_event.c | 69,545,096,076,586,810,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4611 | Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events. | https://nvd.nist.gov/vuln/detail/CVE-2011-4611 |
701 | linux | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | 1 | static int __sys_sendmsg(struct socket *sock, struct msghdr __user *msg,
struct msghdr *msg_sys, unsigned flags,
struct used_address *used_address)
{
struct compat_msghdr __user *msg_compat =
(struct compat_msghdr __user *)msg;
struct sockaddr_storage address;
struct iovec iovstack[UIO_FASTIOV], *iov = ... | 202,239,731,063,059,500,000,000,000,000,000,000,000 | socket.c | 43,740,973,298,172,260,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4594 | The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2011-4594 |
702 | linux | a9cf73ea7ff78f52662c8658d93c226effbbedde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a9cf73ea7ff78f52662c8658d93c226effbbedde | ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | 1 | static struct sk_buff *udp6_ufo_fragment(struct sk_buff *skb, u32 features)
{
struct sk_buff *segs = ERR_PTR(-EINVAL);
unsigned int mss;
unsigned int unfrag_ip6hlen, unfrag_len;
struct frag_hdr *fptr;
u8 *mac_start, *prevhdr;
u8 nexthdr;
u8 frag_hdr_sz = sizeof(struct frag_hdr);
int offset;
__wsum csum;
mss ... | 94,739,129,464,540,860,000,000,000,000,000,000,000 | udp.c | 10,877,562,915,240,044,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-4326 | The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device. | https://nvd.nist.gov/vuln/detail/CVE-2011-4326 |
730 | linux | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | 1 | static void encode_share_access(struct xdr_stream *xdr, int open_flags)
{
__be32 *p;
RESERVE_SPACE(8);
switch (open_flags & (FMODE_READ|FMODE_WRITE)) {
case FMODE_READ:
WRITE32(NFS4_SHARE_ACCESS_READ);
break;
case FMODE_WRITE:
WRITE32(NFS4_SHARE_ACCESS_WRITE);
break;
case FMODE_READ|FMODE_W... | 128,669,092,881,783,850,000,000,000,000,000,000,000 | nfs4xdr.c | 245,762,914,956,477,180,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-4324 | The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-4324 |
753 | linux | 56c6a8a4aadca809e04276eabe5552935c51387f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/56c6a8a4aadca809e04276eabe5552935c51387f | None | 1 | unsigned int oom_badness(struct task_struct *p, struct mem_cgroup *mem,
const nodemask_t *nodemask, unsigned long totalpages)
{
int points;
if (oom_unkillable_task(p, mem, nodemask))
return 0;
p = find_lock_task_mm(p);
if (!p)
return 0;
/*
* Shortcut check for a thread sharing p->mm that is ... | 321,295,227,204,559,220,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2011-4097 | Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory. | https://nvd.nist.gov/vuln/detail/CVE-2011-4097 |
754 | linux | 15291164b22a357cb211b618adfef4fa82fc0de3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/15291164b22a357cb211b618adfef4fa82fc0de3 | jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer
journal_unmap_buffer()'s zap_buffer: code clears a lot of buffer head
state ala discard_buffer(), but does not touch _Delay or _Unwritten as
discard_buffer() does.
This can be problematic in some areas of the ext4 code which assume
that if they have found a ... | 1 | static int journal_unmap_buffer(journal_t *journal, struct buffer_head *bh)
{
transaction_t *transaction;
struct journal_head *jh;
int may_free = 1;
int ret;
BUFFER_TRACE(bh, "entry");
/*
* It is safe to proceed here without the j_list_lock because the
* buffers cannot be stolen by try_to_free_buffers as lo... | 113,708,723,622,617,750,000,000,000,000,000,000,000 | transaction.c | 47,966,770,736,610,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-4086 | The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel before 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesystem that was mounted with a journal. | https://nvd.nist.gov/vuln/detail/CVE-2011-4086 |
755 | linux | 7ed47b7d142ec99ad6880bbbec51e9f12b3af74c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c | crypto: ghash - Avoid null pointer dereference if no key is set
The ghash_update function passes a pointer to gf128mul_4k_lle which will
be NULL if ghash_setkey is not called or if the most recent call to
ghash_setkey failed to allocate memory. This causes an oops. Fix this
up by returning an error code in the null ... | 1 | static int ghash_final(struct shash_desc *desc, u8 *dst)
{
struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
u8 *buf = dctx->buffer;
ghash_flush(ctx, dctx);
memcpy(dst, buf, GHASH_BLOCK_SIZE);
return 0;
}
| 152,497,505,395,738,600,000,000,000,000,000,000,000 | ghash-generic.c | 237,470,674,440,099,320,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4081 | crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call,... | https://nvd.nist.gov/vuln/detail/CVE-2011-4081 |
756 | linux | 7ed47b7d142ec99ad6880bbbec51e9f12b3af74c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7ed47b7d142ec99ad6880bbbec51e9f12b3af74c | crypto: ghash - Avoid null pointer dereference if no key is set
The ghash_update function passes a pointer to gf128mul_4k_lle which will
be NULL if ghash_setkey is not called or if the most recent call to
ghash_setkey failed to allocate memory. This causes an oops. Fix this
up by returning an error code in the null ... | 1 | static int ghash_update(struct shash_desc *desc,
const u8 *src, unsigned int srclen)
{
struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
u8 *dst = dctx->buffer;
if (dctx->bytes) {
int n = min(srclen, dctx->bytes);
u8 *pos = dst + (GHASH_BLOCK_SIZ... | 33,132,435,692,963,445,000,000,000,000,000,000,000 | ghash-generic.c | 237,470,674,440,099,320,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2011-4081 | crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call,... | https://nvd.nist.gov/vuln/detail/CVE-2011-4081 |
757 | linux | 70945643722ffeac779d2529a348f99567fa5c33 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33 | cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 1 | cifs_mount(struct super_block *sb, struct cifs_sb_info *cifs_sb,
char *mount_data_global, const char *devname)
{
int rc;
int xid;
struct smb_vol *volume_info;
struct cifsSesInfo *pSesInfo;
struct cifsTconInfo *tcon;
struct TCP_Server_Info *srvTcp;
char *full_path;
char *mount_data = mount_data_global;
stru... | 325,540,286,319,854,200,000,000,000,000,000,000,000 | connect.c | 61,138,473,515,121,210,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3363 | The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share. | https://nvd.nist.gov/vuln/detail/CVE-2011-3363 |
758 | linux | c85ce65ecac078ab1a1835c87c4a6319cf74660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c85ce65ecac078ab1a1835c87c4a6319cf74660a | b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | 1 | static void dma_rx(struct b43_dmaring *ring, int *slot)
{
const struct b43_dma_ops *ops = ring->ops;
struct b43_dmadesc_generic *desc;
struct b43_dmadesc_meta *meta;
struct b43_rxhdr_fw4 *rxhdr;
struct sk_buff *skb;
u16 len;
int err;
dma_addr_t dmaaddr;
desc = ops->idx2desc(ring, *slot, &meta);
sync_descbuf... | 104,346,933,262,330,900,000,000,000,000,000,000,000 | dma.c | 2,031,226,938,724,601,400,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3359 | The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. | https://nvd.nist.gov/vuln/detail/CVE-2011-3359 |
759 | linux | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | 1 | static int fuse_notify_inval_entry(struct fuse_conn *fc, unsigned int size,
struct fuse_copy_state *cs)
{
struct fuse_notify_inval_entry_out outarg;
int err = -ENOMEM;
char *buf;
struct qstr name;
buf = kzalloc(FUSE_NAME_MAX + 1, GFP_KERNEL);
if (!buf)
goto err;
err = -EINVAL;
if (size < sizeof(outar... | 64,929,278,621,445,780,000,000,000,000,000,000,000 | dev.c | 242,934,778,288,113,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3353 | Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-3353 |
840 | linux | 0d0138ebe24b94065580bd2601f8bb7eb6152f56 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0138ebe24b94065580bd2601f8bb7eb6152f56 | xtensa: prevent arbitrary read in ptrace
Prevent an arbitrary kernel read. Check the user pointer with access_ok()
before copying data in.
[akpm@linux-foundation.org: s/EIO/EFAULT/]
Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
Cc: Christian Zankel <chris@zankel.net>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc:... | 1 | int ptrace_setxregs(struct task_struct *child, void __user *uregs)
{
struct thread_info *ti = task_thread_info(child);
struct pt_regs *regs = task_pt_regs(child);
elf_xtregs_t *xtregs = uregs;
int ret = 0;
#if XTENSA_HAVE_COPROCESSORS
/* Flush all coprocessors before we overwrite them. */
coprocessor_flush... | 313,347,442,751,777,660,000,000,000,000,000,000,000 | ptrace.c | 166,511,552,720,763,640,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2707 | The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request. | https://nvd.nist.gov/vuln/detail/CVE-2011-2707 |
853 | linux | 2b472611a32a72f4a118c069c2d62a1a3f087afd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2b472611a32a72f4a118c069c2d62a1a3f087afd | ksm: fix NULL pointer dereference in scan_get_next_rmap_item()
Andrea Righi reported a case where an exiting task can race against
ksmd::scan_get_next_rmap_item (http://lkml.org/lkml/2011/6/1/742) easily
triggering a NULL pointer dereference in ksmd.
ksm_scan.mm_slot == &ksm_mm_head with only one registered mm
CPU 1... | 1 | static struct rmap_item *scan_get_next_rmap_item(struct page **page)
{
struct mm_struct *mm;
struct mm_slot *slot;
struct vm_area_struct *vma;
struct rmap_item *rmap_item;
if (list_empty(&ksm_mm_head.mm_list))
return NULL;
slot = ksm_scan.mm_slot;
if (slot == &ksm_mm_head) {
/*
* A number of pages can h... | 257,503,113,012,619,670,000,000,000,000,000,000,000 | ksm.c | 89,371,547,132,209,020,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-2183 | Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2011-2183 |
854 | linux | cae13fe4cc3f24820ffb990c09110626837e85d4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cae13fe4cc3f24820ffb990c09110626837e85d4 | Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | 1 | static bool ldm_frag_add (const u8 *data, int size, struct list_head *frags)
{
struct frag *f;
struct list_head *item;
int rec, num, group;
BUG_ON (!data || !frags);
if (size < 2 * VBLK_SIZE_HEAD) {
ldm_error("Value of size is to small.");
return false;
}
group = get_unaligned_be32(data + 0x08);
rec = ... | 164,142,535,356,774,610,000,000,000,000,000,000,000 | ldm.c | 72,782,463,213,063,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-2182 | The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this... | https://nvd.nist.gov/vuln/detail/CVE-2011-2182 |
855 | linux | 64f3b9e203bd06855072e295557dca1485a2ecba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/64f3b9e203bd06855072e295557dca1485a2ecba | net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 1 | static void ip_expire(unsigned long arg)
{
struct ipq *qp;
struct net *net;
qp = container_of((struct inet_frag_queue *) arg, struct ipq, q);
net = container_of(qp->q.net, struct net, ipv4.frags);
spin_lock(&qp->q.lock);
if (qp->q.last_in & INET_FRAG_COMPLETE)
goto out;
ipq_kill(qp);
IP_INC_STATS_BH(net,... | 133,776,853,164,301,150,000,000,000,000,000,000,000 | ip_fragment.c | 186,555,045,332,970,940,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-1927 | The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets. | https://nvd.nist.gov/vuln/detail/CVE-2011-1927 |
856 | linux | 764355487ea220fdc2faf128d577d7f679b91f97 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97 | Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 1 | static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags,
const char *dev_name, void *raw_data)
{
struct super_block *s;
struct ecryptfs_sb_info *sbi;
struct ecryptfs_dentry_info *root_info;
const char *err = "Getting sb failed";
struct inode *inode;
struct path path;
int rc;
s... | 178,146,217,980,549,530,000,000,000,000,000,000,000 | main.c | 249,723,411,697,278,600,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-1833 | Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid. | https://nvd.nist.gov/vuln/detail/CVE-2011-1833 |
867 | linux | 0f22072ab50cac7983f9660d33974b45184da4f9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0f22072ab50cac7983f9660d33974b45184da4f9 | ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 1 | asmlinkage long sys_oabi_semtimedop(int semid,
struct oabi_sembuf __user *tsops,
unsigned nsops,
const struct timespec __user *timeout)
{
struct sembuf *sops;
struct timespec local_timeout;
long err;
int i;
if (nsops < 1)
return -EINVAL;
sops = kmalloc(sizeof(*sops) * nsops, GFP_KE... | 110,952,072,524,385,940,000,000,000,000,000,000,000 | sys_oabi-compat.c | 203,403,773,724,066,980,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-1759 | Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1759 |
877 | linux | d846f71195d57b0bbb143382647c2c6638b04c5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d846f71195d57b0bbb143382647c2c6638b04c5a | bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | 1 | static int do_replace(struct net *net, const void __user *user,
unsigned int len)
{
int ret, countersize;
struct ebt_table_info *newinfo;
struct ebt_replace tmp;
if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
return -EFAULT;
if (len != sizeof(tmp) + tmp.entries_size) {
BUGPRINT("Wrong len argument... | 1,079,727,230,191,121,500,000,000,000,000,000,000 | ebtables.c | 56,335,259,935,410,570,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1080 | The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, ... | https://nvd.nist.gov/vuln/detail/CVE-2011-1080 |
878 | linux | 43629f8f5ea32a998d06d1bb41eefa0e821ff573 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573 | Bluetooth: bnep: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "device"
field is NULL terminated. This potentially leads to BUG() inside of
alloc_netdev_mqs() and/or information leak by creating a device with a name
made of contents of kernel stack.
Signed-off-by: Vasiliy Kul... | 1 | static int bnep_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
{
struct bnep_connlist_req cl;
struct bnep_connadd_req ca;
struct bnep_conndel_req cd;
struct bnep_conninfo ci;
struct socket *nsock;
void __user *argp = (void __user *)arg;
int err;
BT_DBG("cmd %x arg %lx", cmd, arg);
swi... | 245,883,328,951,772,840,000,000,000,000,000,000,000 | sock.c | 102,512,589,646,469,780,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-1079 | The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BN... | https://nvd.nist.gov/vuln/detail/CVE-2011-1079 |
883 | linux | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b0d6a9b4296fa16a28d10d416db7a770fc03287 | bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 1 | static int br_multicast_add_group(struct net_bridge *br,
struct net_bridge_port *port,
struct br_ip *group)
{
struct net_bridge_mdb_entry *mp;
struct net_bridge_port_group *p;
struct net_bridge_port_group __rcu **pp;
unsigned long now = jiffies;
int err;
spin_lock(&br->multicast_lock);
if (!netif_ru... | 126,154,348,126,534,700,000,000,000,000,000,000,000 | br_multicast.c | 322,560,698,151,282,430,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | https://nvd.nist.gov/vuln/detail/CVE-2011-0716 |
884 | linux | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9 | ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 1 | static int ima_lsm_rule_init(struct ima_measure_rule_entry *entry,
char *args, int lsm_rule, int audit_type)
{
int result;
if (entry->lsm[lsm_rule].rule)
return -EINVAL;
entry->lsm[lsm_rule].type = audit_type;
result = security_filter_rule_init(entry->lsm[lsm_rule].type,
Audit_equal, args,
... | 289,210,770,505,321,260,000,000,000,000,000,000,000 | ima_policy.c | 269,496,230,888,596,200,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0006 | The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an... | https://nvd.nist.gov/vuln/detail/CVE-2011-0006 |
885 | linux | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 | fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 1 | long fuse_do_ioctl(struct file *file, unsigned int cmd, unsigned long arg,
unsigned int flags)
{
struct fuse_file *ff = file->private_data;
struct fuse_conn *fc = ff->fc;
struct fuse_ioctl_in inarg = {
.fh = ff->fh,
.cmd = cmd,
.arg = arg,
.flags = flags
};
struct fuse_ioctl_out outarg;
struct fuse_r... | 265,577,904,395,187,430,000,000,000,000,000,000,000 | file.c | 190,320,006,487,793,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-4650 | Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. | https://nvd.nist.gov/vuln/detail/CVE-2010-4650 |
887 | linux | a2ae4cc9a16e211c8a128ba10d22a85431f093ab | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab | inotify: stop kernel memory leak on file creation failure
If inotify_init is unable to allocate a new file for the new inotify
group we leak the new group. This patch drops the reference on the
group on file allocation failure.
Reported-by: Vegard Nossum <vegard.nossum@gmail.com>
cc: stable@kernel.org
Signed-off-by:... | 1 | SYSCALL_DEFINE1(inotify_init1, int, flags)
{
struct fsnotify_group *group;
struct user_struct *user;
int ret;
/* Check the IN_* constants for consistency. */
BUILD_BUG_ON(IN_CLOEXEC != O_CLOEXEC);
BUILD_BUG_ON(IN_NONBLOCK != O_NONBLOCK);
if (flags & ~(IN_CLOEXEC | IN_NONBLOCK))
return -EINVAL;
user = get_... | 321,635,802,954,137,780,000,000,000,000,000,000,000 | inotify_user.c | 119,666,086,633,222,320,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2010-4250 | Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files. | https://nvd.nist.gov/vuln/detail/CVE-2010-4250 |
888 | linux | f5563318ff1bde15b10e736e97ffce13be08bc1a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a | wireless: radiotap: fix parsing buffer overrun
When parsing an invalid radiotap header, the parser can overrun
the buffer that is passed in because it doesn't correctly check
1) the minimum radiotap header size
2) the space for extended bitmaps
The first issue doesn't affect any in-kernel user as they all
check the... | 1 | int ieee80211_radiotap_iterator_init(
struct ieee80211_radiotap_iterator *iterator,
struct ieee80211_radiotap_header *radiotap_header,
int max_length, const struct ieee80211_radiotap_vendor_namespaces *vns)
{
/* Linux only supports version 0 radiotap format */
if (radiotap_header->it_version)
return -EINVA... | 202,083,656,134,031,100,000,000,000,000,000,000,000 | radiotap.c | 86,018,721,253,196,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7027 | The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header. | https://nvd.nist.gov/vuln/detail/CVE-2013-7027 |
892 | FFmpeg | fe448cd28d674c3eff3072552eae366d0b659ce9 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9 | avcodec/jpeg2000dec: prevent out of array accesses in pixel addressing
Fixes Ticket2921
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int jpeg2000_decode_tile(Jpeg2000DecoderContext *s, Jpeg2000Tile *tile,
AVFrame *picture)
{
int compno, reslevelno, bandno;
int x, y;
uint8_t *line;
Jpeg2000T1Context t1;
/* Loop on tile components */
for (compno = 0; compno < s->ncomponents; compno++) {
... | 128,636,664,101,031,800,000,000,000,000,000,000,000 | jpeg2000dec.c | 193,978,670,820,427,930,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7024 | The jpeg2000_decode_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not consider the component number in certain calculations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG2000 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7024 |
893 | FFmpeg | f31011e9abfb2ae75bb32bc44e2c34194c8dc40a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/f31011e9abfb2ae75bb32bc44e2c34194c8dc40a | avcodec/parser: reset indexes on realloc failure
Fixes Ticket2982
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | int ff_combine_frame(ParseContext *pc, int next, const uint8_t **buf, int *buf_size)
{
if(pc->overread){
av_dlog(NULL, "overread %d, state:%X next:%d index:%d o_index:%d\n",
pc->overread, pc->state, next, pc->index, pc->overread_index);
av_dlog(NULL, "%X %X %X %X\n", (*buf)[0], (*buf... | 222,309,056,610,865,200,000,000,000,000,000,000,000 | parser.c | 161,485,228,604,924,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7023 | The ff_combine_frame function in libavcodec/parser.c in FFmpeg before 2.1 does not properly handle certain memory-allocation errors, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7023 |
894 | FFmpeg | e07ac727c1cc9eed39e7f9117c97006f719864bd | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e07ac727c1cc9eed39e7f9117c97006f719864bd | avcodec/g2meet: Fix framebuf size
Currently the code can in some cases draw tiles that hang outside the
allocated buffer. This patch increases the buffer size to avoid out
of array accesses. An alternative would be to fail if such tiles are
encountered.
I do not know if any valid files use such hanging tiles.
Fixes T... | 1 | static int g2m_init_buffers(G2MContext *c)
{
int aligned_height;
if (!c->framebuf || c->old_width < c->width || c->old_height < c->height) {
c->framebuf_stride = FFALIGN(c->width * 3, 16);
aligned_height = FFALIGN(c->height, 16);
av_free(c->framebuf);
c->framebuf = a... | 255,877,059,988,693,140,000,000,000,000,000,000,000 | g2meet.c | 290,068,666,600,478,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7022 | The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 does not properly allocate memory for tiles, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7022 |
895 | FFmpeg | cdd5df8189ff1537f7abe8defe971f80602cc2d2 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cdd5df8189ff1537f7abe8defe971f80602cc2d2 | avfilter/vf_fps: make sure the fifo is not empty before using it
Fixes Ticket2905
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int filter_frame(AVFilterLink *inlink, AVFrame *buf)
{
AVFilterContext *ctx = inlink->dst;
FPSContext *s = ctx->priv;
AVFilterLink *outlink = ctx->outputs[0];
int64_t delta;
int i, ret;
s->frames_in++;
/* discard frames until we get the first timestamp */
if (s->pt... | 40,209,124,885,848,567,000,000,000,000,000,000,000 | vf_fps.c | 87,163,599,502,171,520,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-7021 | The filter_frame function in libavfilter/vf_fps.c in FFmpeg before 2.1 does not properly ensure the availability of FIFO content, which allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact via crafted data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7021 |
896 | FFmpeg | b05cd1ea7e45a836f7f6071a716c38bb30326e0f | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b05cd1ea7e45a836f7f6071a716c38bb30326e0f | ffv1dec: Check bits_per_raw_sample and colorspace for equality in ver 0/1 headers
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int read_header(FFV1Context *f)
{
uint8_t state[CONTEXT_SIZE];
int i, j, context_count = -1; //-1 to avoid warning
RangeCoder *const c = &f->slice_context[0]->c;
memset(state, 128, sizeof(state));
if (f->version < 2) {
int chroma_planes, chroma_h_shift, chroma_v_shift, transparen... | 145,906,591,874,544,820,000,000,000,000,000,000,000 | ffv1dec.c | 84,436,554,014,232,130,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7020 | The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not properly enforce certain bit-count and colorspace constraints, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted FFV1 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7020 |
897 | FFmpeg | a1b9004b768bef606ee98d417bceb9392ceb788d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a1b9004b768bef606ee98d417bceb9392ceb788d | avcodec/jpeg2000dec: fix context consistency with too large lowres
Fixes out of array accesses
Fixes Ticket2898
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int get_cox(Jpeg2000DecoderContext *s, Jpeg2000CodingStyle *c)
{
uint8_t byte;
if (bytestream2_get_bytes_left(&s->g) < 5)
return AVERROR_INVALIDDATA;
/* nreslevels = number of resolution levels
= number of decomposition level +1 */
c->nreslevels = bytestream2_get_byt... | 284,258,088,157,399,600,000,000,000,000,000,000,000 | jpeg2000dec.c | 278,171,418,550,605,900,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-7019 | The get_cox function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not properly validate the reduction factor, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG2000 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7019 |
901 | FFmpeg | 8bb11c3ca77b52e05a9ed1496a65f8a76e6e2d8f | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8bb11c3ca77b52e05a9ed1496a65f8a76e6e2d8f | avcodec/jpeg2000dec: Check cdx/y values more carefully
Some invalid values where not handled correctly in the later pixel
format matching code.
Fixes out of array accesses
Fixes Ticket2848
Found-by: Piotr Bandurski <ami_stuff@o2.pl>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int get_siz(Jpeg2000DecoderContext *s)
{
int i;
int ncomponents;
uint32_t log2_chroma_wh = 0;
const enum AVPixelFormat *possible_fmts = NULL;
int possible_fmts_nb = 0;
if (bytestream2_get_bytes_left(&s->g) < 36)
return AVERROR_INVALIDDATA;
s->avctx->profile = bytestream2_get... | 101,435,318,398,182,140,000,000,000,000,000,000,000 | jpeg2000dec.c | 304,981,785,298,091,180,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7016 | The get_siz function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not ensure the expected sample separation, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG2000 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7016 |
902 | FFmpeg | 880c73cd76109697447fbfbaa8e5ee5683309446 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/880c73cd76109697447fbfbaa8e5ee5683309446 | avcodec/flashsv: check diff_start/height
Fixes out of array accesses
Fixes Ticket2844
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int flashsv_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *avpkt)
{
int buf_size = avpkt->size;
FlashSVContext *s = avctx->priv_data;
int h_blocks, v_blocks, h_part, v_part, i, j, ret;
GetBitContext gb;
int last_blockwidth = s-... | 269,767,046,134,726,600,000,000,000,000,000,000,000 | flashsv.c | 325,814,377,149,258,860,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-7015 | The flashsv_decode_frame function in libavcodec/flashsv.c in FFmpeg before 2.1 does not properly validate a certain height value, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Flash Screen Video data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7015 |
903 | FFmpeg | 86736f59d6a527d8bc807d09b93f971c0fe0bb07 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/86736f59d6a527d8bc807d09b93f971c0fe0bb07 | avcodec/pngdsp: fix (un)signed type in end comparission
Fixes out of array accesses
Fixes Ticket2919
Found_by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static void add_bytes_l2_c(uint8_t *dst, uint8_t *src1, uint8_t *src2, int w)
{
long i;
for (i = 0; i <= w - sizeof(long); i += sizeof(long)) {
long a = *(long *)(src1 + i);
long b = *(long *)(src2 + i);
*(long *)(dst + i) = ((a & pb_7f) + (b & pb_7f)) ^ ((a ^ b) & pb_80);
}
... | 13,327,716,502,808,840,000,000,000,000,000,000,000 | pngdsp.c | 272,561,586,882,969,750,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-7014 | Integer signedness error in the add_bytes_l2_c function in libavcodec/pngdsp.c in FFmpeg before 2.1 allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted PNG data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7014 |
904 | FFmpeg | 821a5938d100458f4d09d634041b05c860554ce0 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/821a5938d100458f4d09d634041b05c860554ce0 | avcodec/g2meet: Fix order of align and pixel size multiplication.
Fixes out of array accesses
Fixes Ticket2922
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int g2m_init_buffers(G2MContext *c)
{
int aligned_height;
if (!c->framebuf || c->old_width < c->width || c->old_height < c->height) {
c->framebuf_stride = FFALIGN(c->width * 3, 16);
aligned_height = FFALIGN(c->height, 16);
av_free(c->framebuf);
c->framebuf = av_mal... | 230,706,319,375,448,130,000,000,000,000,000,000,000 | g2meet.c | 321,002,839,552,375,500,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-7013 | The g2m_init_buffers function in libavcodec/g2meet.c in FFmpeg before 2.1 uses an incorrect ordering of arithmetic operations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Go2Webinar data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7013 |
905 | FFmpeg | 780669ef7c23c00836a24921fcc6b03be2b8ca4a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/780669ef7c23c00836a24921fcc6b03be2b8ca4a | avcodec/jpeg2000dec: non zero image offsets are not supported
Fixes out of array accesses
Fixes Ticket3080
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int get_siz(Jpeg2000DecoderContext *s)
{
int i;
int ncomponents;
uint32_t log2_chroma_wh = 0;
const enum AVPixelFormat *possible_fmts = NULL;
int possible_fmts_nb = 0;
if (bytestream2_get_bytes_left(&s->g) < 36)
return AVERROR_INVALIDDATA;
s->avctx->profile = bytestream2_get... | 85,678,138,236,663,390,000,000,000,000,000,000,000 | jpeg2000dec.c | 302,431,616,552,773,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7012 | The get_siz function in libavcodec/jpeg2000dec.c in FFmpeg before 2.1 does not prevent attempts to use non-zero image offsets, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG2000 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7012 |
906 | FFmpeg | 547d690d676064069d44703a1917e0dab7e33445 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/547d690d676064069d44703a1917e0dab7e33445 | ffv1dec: check that global parameters dont change in version 0/1
Such changes are not allowed nor supported
Fixes Ticket2906
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int read_header(FFV1Context *f)
{
uint8_t state[CONTEXT_SIZE];
int i, j, context_count = -1; //-1 to avoid warning
RangeCoder *const c = &f->slice_context[0]->c;
memset(state, 128, sizeof(state));
if (f->version < 2) {
unsigned v= get_symbol(c, state, 0);
if (v >= 2) {
... | 255,289,524,855,579,600,000,000,000,000,000,000,000 | ffv1dec.c | 71,974,849,264,050,880,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7011 | The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not prevent changes to global parameters, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted FFV1 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7011 |
909 | FFmpeg | 3819db745da2ac7fb3faacb116788c32f4753f34 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/3819db745da2ac7fb3faacb116788c32f4753f34 | avcodec/rpza: Perform pointer advance and checks before using the pointers
Fixes out of array accesses
Fixes Ticket2850
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static void rpza_decode_stream(RpzaContext *s)
{
int width = s->avctx->width;
int stride = s->frame.linesize[0] / 2;
int row_inc = stride - 4;
int stream_ptr = 0;
int chunk_size;
unsigned char opcode;
int n_blocks;
unsigned short colorA = 0, colorB;
unsigned short color4[4];
unsi... | 269,902,084,834,802,800,000,000,000,000,000,000,000 | rpza.c | 178,523,187,513,410,220,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7009 | The rpza_decode_stream function in libavcodec/rpza.c in FFmpeg before 2.1 does not properly maintain a pointer to pixel data, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Apple RPZA data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7009 |
910 | krb5 | c2ccf4197f697c4ff143b8a786acdd875e70a89d | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/c2ccf4197f697c4ff143b8a786acdd875e70a89d | Multi-realm KDC null deref [CVE-2013-1418]
If a KDC serves multiple realms, certain requests can cause
setup_server_realm() to dereference a null pointer, crashing the KDC.
CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
A related but more minor vulnerability requires authentication to
exploit, and is only prese... | 1 | setup_server_realm(krb5_principal sprinc)
{
krb5_error_code kret;
kdc_realm_t *newrealm;
kret = 0;
if (kdc_numrealms > 1) {
if (!(newrealm = find_realm_data(sprinc->realm.data,
(krb5_ui_4) sprinc->realm.length)))
kret = ENOE... | 321,135,329,376,345,060,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2013-1418 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2013-1418 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.