axs2k/anubis
Reinforcement Learning • Updated • 3
commit_msg stringlengths 1 24.2k | commit_hash stringlengths 2 84 ⌀ | project stringlengths 2 40 | source stringclasses 4
values | labels int64 0 1 | repo_url stringlengths 26 70 ⌀ | commit_url stringlengths 74 118 ⌀ | commit_date stringlengths 25 25 ⌀ |
|---|---|---|---|---|---|---|---|
[glyphstring] Handle overflow with very long glyphstrings | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | pango | bigvul | 1 | null | null | null |
Don't shell-interpret \@SELECTED_URI (fixes FS#240) | 9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975 | uzbl | bigvul | 1 | null | null | null |
Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | beanstalkd | bigvul | 1 | null | null | null |
Check if an SSL certificate matches the hostname of the server we are connecting to
git-svn-id: http://svn.irssi.org/repos/irssi/trunk@5104 dbcabf3a-b0e7-0310-adc4-f8d773084564 | 85bbc05b21678e80423815d2ef1dfe26208491ab | irssi-proxy | bigvul | 1 | null | null | null |
Use strncmp when checking for large ascii multigets. | d9cd01ede97f4145af9781d448c62a3318952719 | memcached | bigvul | 1 | null | null | null |
disable Uzbl javascript object because of security problem. | 1958b52d41cba96956dc1995660de49525ed1047 | uzbl | bigvul | 1 | null | null | null |
Do not attempt to decode APE file with no frames
This fixes invalid reads/writes with this sample:
http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt | 8312e3fc9041027a33c8bc667bb99740fdf41dd5 | ffmpeg | bigvul | 1 | null | null | null |
Flush the command buffer after switching to TLS.
Fixes a flaw similar to CVE-2011-0411. | 65c4d4ad331e94661de763e9b5304d28698999c4 | pure-ftpd | bigvul | 1 | null | null | null |
Fix buffer size checking
Yes, this means we've re-introduced CVE-2005-3534. Sigh. | 3ef52043861ab16352d49af89e048ba6339d6df8 | nbd | bigvul | 1 | null | null | null |
tools: hv: Netlink source address validation allows DoS
The source code without this patch caused hypervkvpd to exit when it processed
a spoofed Netlink packet which has been sent from an untrusted local user.
Now Netlink messages with a non-zero nl_pid source address are ignored
and a warning is printed into the sysl... | 95a69adab9acfc3981c504737a2b6578e4d846ef | linux | bigvul | 1 | null | null | null |
mm/hotplug: correctly add new zone to all other nodes' zone lists
When online_pages() is called to add new memory to an empty zone, it
rebuilds all zone lists by calling build_all_zonelists(). But there's a
bug which prevents the new zone to be added to other nodes' zone lists.
online_pages() {
build_all_zonelists(... | 08dff7b7d629807dbb1f398c68dd9cd58dd657a1 | linux | bigvul | 1 | null | null | null |
net: fix divide by zero in tcp algorithm illinois
Reading TCP stats when using TCP Illinois congestion control algorithm
can cause a divide by zero kernel oops.
The division by zero occur in tcp_illinois_info() at:
do_div(t, ca->cnt_rtt);
where ca->cnt_rtt can become zero (when rtt_reset is called)
Steps to Reprodu... | 8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 | linux | bigvul | 1 | null | null | null |
ext4: race-condition protection for ext4_convert_unwritten_extents_endio
We assumed that at the time we call ext4_convert_unwritten_extents_endio()
extent in question is fully inside [map.m_lblk, map->m_len] because
it was already split during submission. But this may not be true due to
a race between writeback vs fa... | dee1f973ca341c266229faa5a1a5bb268bed3531 | linux | bigvul | 1 | null | null | null |
Fix order of arguments to compat_put_time[spec|val]
Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in
net/socket.c") introduced a bug where the helper functions to take
either a 64-bit or compat time[spec|val] got the arguments in the wrong
order, passing the kernel stack pointer off as a user pointer (and... | ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d | linux | bigvul | 1 | null | null | null |
ipv6: discard overlapping fragment
RFC5722 prohibits reassembling fragments when some data overlaps.
Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>.
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | 70789d7052239992824628db8133de08dc78e593 | linux | bigvul | 1 | null | null | null |
inet: add RCU protection to inet->opt
We lack proper synchronization to manipulate inet->opt ip_options
Problem is ip_make_skb() calls ip_setup_cork() and
ip_setup_cork() possibly makes a copy of ipc->opt (struct ip_options),
without any protection against another thread manipulating inet->opt.
Another thread can ch... | f6d8bd051c391c1c0458a30b2a7abcd939329259 | linux | bigvul | 1 | null | null | null |
Fixed possibility of Unsolicited Dialback Attacks | aabcffae560d5fd00cd1d2ffce5d760353cf0a4d | jabberd2 | bigvul | 1 | null | null | null |
af_netlink: force credentials passing [CVE-2012-3520]
Pablo Neira Ayuso discovered that avahi and
potentially NetworkManager accept spoofed Netlink messages because of a
kernel bug. The kernel passes all-zero SCM_CREDENTIALS ancillary data
to the receiver if the sender did not provide such data, instead of not
includ... | e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea | linux | bigvul | 1 | null | null | null |
mm: Hold a file reference in madvise_remove
Otherwise the code races with munmap (causing a use-after-free
of the vma) or with close (causing a use-after-free of the struct
file).
The bug was introduced by commit 90ed52ebe481 ("[PATCH] holepunch: fix
mmap_sem i_mutex deadlock")
Cc: Hugh Dickins <hugh@veritas.com>
Cc... | 9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb | linux | bigvul | 1 | null | null | null |
[PATCH] xacct_add_tsk: fix pure theoretical ->mm use-after-free
Paranoid fix. The task can free its ->mm after the 'if (p->mm)' check.
Signed-off-by: Oleg Nesterov <oleg@tv-sign.ru>
Cc: Shailabh Nagar <nagar@watson.ibm.com>
Cc: Balbir Singh <balbir@in.ibm.com>
Cc: Jay Lan <jlan@sgi.com>
Signed-off-by: Andrew Morton <... | f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9 | linux | bigvul | 1 | null | null | null |
rds: set correct msg_namelen
Jay Fenlason (fenlason@redhat.com) found a bug,
that recvfrom() on an RDS socket can return the contents of random kernel
memory to userspace if it was called with a address length larger than
sizeof(struct sockaddr_in).
rds_recvmsg() also fails to set the addr_len paramater properly befor... | 06b6a1cf6e776426766298d055bb3991957d90a7 | linux | bigvul | 1 | null | null | null |
sfc: Fix maximum number of TSO segments and minimum TX queue size
[ Upstream commit 7e6d06f0de3f74ca929441add094518ae332257c ]
Currently an skb requiring TSO may not fit within a minimum-size TX
queue. The TX queue selected for the skb may stall and trigger the TX
watchdog repeatedly (since the problem skb will be r... | 68cb695ccecf949d48949e72f8ce591fdaaa325c | linux | bigvul | 1 | null | null | null |
udf: Avoid run away loop when partition table length is corrupted
Check provided length of partition table so that (possibly maliciously)
corrupted partition table cannot cause accessing data beyond current buffer.
Signed-off-by: Jan Kara <jack@suse.cz> | adee11b2085bee90bd8f4f52123ffb07882d6256 | linux | bigvul | 1 | null | null | null |
epoll: clear the tfile_check_list on -ELOOP
An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent
circular epoll dependencies from being created. However, in that case we
do not properly clear the 'tfile_check_list'. Thus, add a call to
clear_tfile_check_list() for the -ELOOP case.
Signed-off-by: ... | 13d518074a952d33d47c428419693f63389547e9 | linux | bigvul | 1 | null | null | null |
cred: copy_process() should clear child->replacement_session_keyring
keyctl_session_to_parent(task) sets ->replacement_session_keyring,
it should be processed and cleared by key_replace_session_keyring().
However, this task can fork before it notices TIF_NOTIFY_RESUME and
the new child gets the bogus ->replacement_se... | 79549c6dfda0603dba9a70a53467ce62d9335c33 | linux | bigvul | 1 | null | null | null |
netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment
When an ICMPV6_PKT_TOOBIG message is received with a MTU below 1280,
all further packets include a fragment header.
Unlike regular defragmentation, conntrack also needs to "reassemble"
those fragments in order to obtain a packet ... | 9e2dcf72023d1447f09c47d77c99b0c49659e5ce | linux | bigvul | 1 | null | null | null |
Avoid overflowing allocation size in CallMalloc()
The wraparound could happen if USE_MAGIC_HEADERS is enabled. | 1a759756639ab7543b650a10c2d77a0ffc7a2000 | nedmalloc | bigvul | 1 | null | null | null |
Fix calloc() overflow
* malloc.c (calloc): Check multiplication overflow in calloc(),
assuming REDIRECT_MALLOC. | e10c1eb9908c2774c16b3148b30d2f3823d66a9a | bdwgc | bigvul | 1 | null | null | null |
Tools: hv: verify origin of netlink connector message
The SuSE security team suggested to use recvfrom instead of recv to be
certain that the connector message is originated from kernel.
CVE-2012-2669
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Signed-off-by: Marcus Meissner <meissner@suse.de>
Signed-off-by: Sebasti... | bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c | linux | bigvul | 1 | null | null | null |
hugetlb: fix resv_map leak in error path
When called for anonymous (non-shared) mappings, hugetlb_reserve_pages()
does a resv_map_alloc(). It depends on code in hugetlbfs's
vm_ops->close() to release that allocation.
However, in the mmap() failure path, we do a plain unmap_region() without
the remove_vma() which act... | c50ac050811d6485616a193eb0f37bfbd191cc89 | linux | bigvul | 1 | null | null | null |
Cap escape sequence parameters to prevent long loops.
Fixes #271 github issue. | 9791768705528e911bfca6c4d8aa88139035060e | mosh | bigvul | 1 | null | null | null |
drm/i915: fix integer overflow in i915_gem_do_execbuffer()
On 32-bit systems, a large args->num_cliprects from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid
allocation for execbuffer object list").
Signed-... | 44afb3a04391a74309d16180d1e4f8386fdfa745 | linux | bigvul | 1 | null | null | null |
drm/i915: fix integer overflow in i915_gem_execbuffer2()
On 32-bit systems, a large args->buffer_count from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 8408c282 ("drm/i915:
First try a normal large kmalloc for the temporary exec bu... | ed8cd3b2cd61004cab85380c52b1817aca1ca49b | linux | bigvul | 1 | null | null | null |
Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 20e0fa98b751facf9a1101edaefbc19c82616a68 | linux | bigvul | 1 | null | null | null |
mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition
When holding the mmap_sem for reading, pmd_offset_map_lock should only
run on a pmd_t that has been read atomically from the pmdp pointer,
otherwise we may read only half of it leading to this crash.
PID: 11679 TASK: f06e8000 CPU: 3 CO... | 26c191788f18129af0eb32a358cdaea0c7479626 | linux | bigvul | 1 | null | null | null |
hfsplus: Fix potential buffer overflows
Commit ec81aecb2966 ("hfs: fix a potential buffer overflow") fixed a few
potential buffer overflows in the hfs filesystem. But as Timo Warns
pointed out, these changes also need to be made on the hfsplus
filesystem as well.
Reported-by: Timo Warns <warns@pre-sense.de>
Acked-by... | 6f24f892871acc47b40dd594c63606a17c714f77 | linux | bigvul | 1 | null | null | null |
dl2k: Clean up rio_ioctl
The dl2k driver's rio_ioctl call has a few issues:
- No permissions checking
- Implements SIOCGMIIREG and SIOCGMIIREG using the SIOCDEVPRIVATE numbers
- Has a few ioctls that may have been used for debugging at one point
but have no place in the kernel proper.
This patch removes all but the... | 1bb57e940e1958e40d51f2078f50c3a96a9b2d75 | linux | bigvul | 1 | null | null | null |
net: sock: validate data_len before allocating skb in sock_alloc_send_pskb()
We need to validate the number of pages consumed by data_len, otherwise frags
array could be overflowed by userspace. So this patch validate data_len and
return -EMSGSIZE when data_len may occupies more frags than MAX_SKB_FRAGS.
Signed-off-b... | cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc | linux | bigvul | 1 | null | null | null |
hugepages: fix use after free bug in "quota" handling
hugetlbfs_{get,put}_quota() are badly named. They don't interact with the
general quota handling code, and they don't much resemble its behaviour.
Rather than being about maintaining limits on on-disk block usage by
particular users, they are instead about maintai... | 90481622d75715bfcb68501280a917dbfe516029 | linux | bigvul | 1 | null | null | null |
procfs: fix a vfsmount longterm reference leak
kern_mount() doesn't pair with plain mntput()...
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 905ad269c55fc62bee3da29f7b1d1efeba8aa1e1 | linux | bigvul | 1 | null | null | null |
fcaps: clear the same personality flags as suid when fcaps are used
If a process increases permissions using fcaps all of the dangerous
personality flags which are cleared for suid apps should also be cleared.
Thus programs given priviledge with fcaps will continue to have address space
randomization enabled even if t... | d52fc5dde171f030170a6cb78034d166b13c9445 | linux | bigvul | 1 | null | null | null |
KVM: unmap pages from the iommu when slots are removed
commit 32f6daad4651a748a58a3ab6da0611862175722f upstream.
We've been adding new mappings, but not destroying old mappings.
This can lead to a page leak as pages are pinned using
get_user_pages, but only unpinned with put_page if they still
exist in the memslots l... | 09ca8e1173bcb12e2a449698c9ae3b86a8a10195 | linux | bigvul | 1 | null | null | null |
ext4: fix undefined behavior in ext4_fill_flex_info()
Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by
zero when trying to mount a corrupted file system") fixes CVE-2009-4307
by performing a sanity check on s_log_groups_per_flex, since it can be
set to a bogus value by an attacker.
sbi->s_log_... | d50f2ab6f050311dbf7b8f5501b25f0bf64a439b | linux | bigvul | 1 | null | null | null |
Fix Win32 RPC Crashes. | 8864019f6d88b13d3442843d9e6ebeb8dd938831 | bitcoin | bigvul | 1 | null | null | null |
Merge pull request #1 from nenolod/insp20
DNS resolver hardening (insp20 branch) | fe7dbd2c104c37f6f3af7d9f1646a3c332aea4a4 | inspircd | bigvul | 1 | null | null | null |
KVM: Ensure all vcpus are consistent with in-kernel irqchip settings
(cherry picked from commit 3e515705a1f46beb1c942bb8043c16f8ac7b1e9e)
If some vcpus are created before KVM_CREATE_IRQCHIP, then
irqchip_in_kernel() and vcpu->arch.apic will be inconsistent, leading
to potential NULL pointer dereferences.
Fix by:
- e... | 9c895160d25a76c21b65bad141b08e8d4f99afef | linux | bigvul | 1 | null | null | null |
Avoid uint overflow in case the length + index is over UINT_MAX | dcdf4fd954e3213c355746fa15b7480461972308 | taglib | bigvul | 1 | null | null | null |
[IPV6]: Fix slab corruption running ip6sic
From: Eric Sesterhenn <snakebyte@gmx.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | d0772b70faaf8e9f2013b6c4273d94d5eac8047a | linux | bigvul | 1 | null | null | null |
Fix bounds checks again. | 1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b | file | bigvul | 1 | null | null | null |
mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode
commit 1a5a9906d4e8d1976b701f889d8f35d54b928f25 upstream.
In some cases it may happen that pmd_none_or_clear_bad() is called with
the mmap_sem hold in read mode. In those cases the huge page faults can
allocate hugepmds under pmd_none_or_clea... | 4a1d704194a441bf83c636004a479e01360ec850 | linux | bigvul | 1 | null | null | null |
refactor pyfribidi.c module
pyfribidi.c is now compiled as _pyfribidi. This module only handles
unicode internally and doesn't use the fribidi_utf8_to_unicode
function (which can't handle 4 byte utf-8 sequences). This fixes the
buffer overflow in issue #2.
The code is now also much simpler: pyfribidi.c is down from 2... | d2860c655357975e7b32d84e6b45e98f0dcecd7a | pyfribidi | bigvul | 1 | null | null | null |
mm: memcg: Correct unregistring of events attached to the same eventfd
There is an issue when memcg unregisters events that were attached to
the same eventfd:
- On the first call mem_cgroup_usage_unregister_event() removes all
events attached to a given eventfd, and if there were no events left,
thresholds->prima... | 371528caec553785c37f73fa3926ea0de84f986f | linux | bigvul | 1 | null | null | null |
Be more careful when parsing Vorbis Comments | b3646a07348ffa276ea41a9dae03ddc63ea6c532 | taglib | bigvul | 1 | null | null | null |
Make sure to not try dividing by zero | 77d61c6eca4d08b9b025738acf6b926cc750db23 | taglib | bigvul | 1 | null | null | null |
regset: Prevent null pointer reference on readonly regsets
The regset common infrastructure assumed that regsets would always
have .get and .set methods, but not necessarily .active methods.
Unfortunately people have since written regsets without .set methods.
Rather than putting in stub functions everywhere, handle ... | c8e252586f8d5de906385d8cf6385fee289a825e | linux | bigvul | 1 | null | null | null |
cifs: fix dentry refcount leak when opening a FIFO on lookup
commit 5bccda0ebc7c0331b81ac47d39e4b920b198b2cd upstream.
The cifs code will attempt to open files on lookup under certain
circumstances. What happens though if we find that the file we opened
was actually a FIFO or other special file?
Currently, the open ... | 88d7d4e4a439f32acc56a6d860e415ee71d3df08 | linux | bigvul | 1 | null | null | null |
Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | krb5 | bigvul | 1 | null | null | null |
kernel/sys.c: fix stack memory content leak via UNAME26
Calling uname() with the UNAME26 personality set allows a leak of kernel
stack contents. This fixes it by defensively calculating the length of
copy_to_user() call, making the len argument unsigned, and initializing
the stack buffer to zero (now technically unne... | 2702b1526c7278c4d65d78de209a465d4de2885e | linux | bigvul | 1 | null | null | null |
block: Fix io_context leak after clone with CLONE_IO
With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks.
However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks
reaches 0.
Always call put_io_context() in exit_io_context().
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com... | 61cc74fbb87af6aa551a06a370590c9bc07e29d9 | linux | bigvul | 1 | null | null | null |
Explicitly remove file permissions for settings and DB | 5632c35d6759f5e13a7dfe78e4ee6403ff6a8e3e | mumble | bigvul | 1 | null | null | null |
Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory) | 73b1968ee30f6d9d2dae497544b910e68e114bfa | suhosin | bigvul | 1 | null | null | null |
igmp: Avoid zero delay when receiving odd mixture of IGMP queries
Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP
behavior on v3 query during v2-compatibility mode') added yet another
case for query parsing, which can result in max_delay = 0. Substitute
a value of 1, as in the usual v3 case.
Rep... | a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27 | linux | bigvul | 1 | null | null | null |
Unused iocbs in a batch should not be accounted as active.
commit 69e4747ee9727d660b88d7e1efe0f4afcb35db1b upstream.
Since commit 080d676de095 ("aio: allocate kiocbs in batches") iocbs are
allocated in a batch during processing of first iocbs. All iocbs in a
batch are automatically added to ctx->active_reqs list and... | 802f43594d6e4d2ac61086d239153c17873a0428 | linux | bigvul | 1 | null | null | null |
KVM: x86: fix missing checks in syscall emulation
On hosts without this patch, 32bit guests will crash (and 64bit guests
may behave in a wrong way) for example by simply executing following
nasm-demo-application:
[bits 32]
global _start
SECTION .text
_start: syscall
(I tested it with winxp and linux ... | c2226fc9e87ba3da060e47333657cd6616652b84 | linux | bigvul | 1 | null | null | null |
drm: integer overflow in drm_mode_dirtyfb_ioctl()
There is a potential integer overflow in drm_mode_dirtyfb_ioctl()
if userspace passes in a large num_clips. The call to kmalloc would
allocate a small buffer, and the call to fb->funcs->dirty may result
in a memory corruption.
Reported-by: Haogang Chen <haogangchen@g... | a5cd335165e31db9dbab636fd29895d41da55dd2 | linux | bigvul | 1 | null | null | null |
xfs: validate acl count
This prevents in-memory corruption and possible panics if the on-disk
ACL is badly corrupted.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba | linux | bigvul | 1 | null | null | null |
CVE-2012-0037
Enforce entity loading policy in raptor_libxml_resolveEntity
and raptor_libxml_getEntity by checking for file URIs and network URIs.
Add RAPTOR_OPTION_LOAD_EXTERNAL_ENTITIES / loadExternalEntities for
turning on loading of XML external entity loading, disabled by default.
This affects all the parsers t... | a676f235309a59d4aa78eeffd2574ae5d341fcb0 | raptor | bigvul | 1 | null | null | null |
URL sanitize: reject URLs containing bad data
Protocols (IMAP, POP3 and SMTP) that use the path part of a URL in a
decoded manner now use the new Curl_urldecode() function to reject URLs
with embedded control codes (anything that is or decodes to a byte value
less than 32).
URLs containing such codes could easily oth... | 75ca568fa1c19de4c5358fed246686de8467c238 | curl | bigvul | 1 | null | null | null |
Move "exit_robust_list" into mm_release()
We don't want to get rid of the futexes just at exit() time, we want to
drop them when doing an execve() too, since that gets rid of the
previous VM image too.
Doing it at mm_release() time means that we automatically always do it
when we disassociate a VM map from the task.
... | 8141c7f3e7aee618312fa1c15109e1219de784a7 | linux | bigvul | 1 | null | null | null |
rose: Add length checks to CALL_REQUEST parsing
Define some constant offsets for CALL_REQUEST based on the description
at <http://www.techfest.com/networking/wan/x25plp.htm> and the
definition of ROSE as using 10-digit (5-byte) addresses. Use them
consistently. Validate all implicit and explicit facilities lengths.
... | e0bccd315db0c2f919e7fcf9cb60db21d9986f52 | linux | bigvul | 1 | null | null | null |
ROSE: prevent heap corruption with bad facilities
When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for
a remote host to provide more digipeaters than expected, resulting in
heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and
abort facilities parsing on failure.
Additionally, wh... | be20250c13f88375345ad99950190685eda51eb8 | linux | bigvul | 1 | null | null | null |
Sched: fix skip_clock_update optimization
idle_balance() drops/retakes rq->lock, leaving the previous task
vulnerable to set_tsk_need_resched(). Clear it after we return
from balancing instead, and in setup_thread_stack() as well, so
no successfully descheduled or never scheduled task has it set.
Need resched confus... | f26f9aff6aaf67e9a430d16c266f91b13a5bff64 | linux | bigvul | 1 | null | null | null |
perf, powerpc: Handle events that raise an exception without overflowing
Events on POWER7 can roll back if a speculative event doesn't
eventually complete. Unfortunately in some rare cases they will
raise a performance monitor exception. We need to catch this to
ensure we reset the PMC. In all cases the PMC will be 25... | 0837e3242c73566fc1c0196b4ec61779c25ffc93 | linux | bigvul | 1 | null | null | null |
sendmmsg/sendmsg: fix unsafe user pointer access
Dereferencing a user pointer directly from kernel-space without going
through the copy_from_user family of functions is a bad idea. Two of
such usages can be found in the sendmsg code path called from sendmmsg,
added by
commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u... | bc909d9ddbf7778371e36a651d6e4194b1cc7d4c | linux | bigvul | 1 | null | null | null |
ipv6: udp: fix the wrong headroom check
At this point, skb->data points to skb_transport_header.
So, headroom check is wrong.
For some case:bridge(UFO is on) + eth device(UFO is off),
there is no enough headroom for IPv6 frag head.
But headroom check is always false.
This will bring about data be moved to there prio... | a9cf73ea7ff78f52662c8658d93c226effbbedde | linux | bigvul | 1 | null | null | null |
NFSv4: Convert the open and close ops to use fmode
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com> | dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 | linux | bigvul | 1 | null | null | null |
NFSv4: include bitmap in nfsv4 get acl data
The NFSv4 bitmap size is unbounded: a server can return an arbitrary
sized bitmap in an FATTR4_WORD0_ACL request. Replace using the
nfs4_fattr_bitmap_maxsz as a guess to the maximum bitmask returned by a server
with the inclusion of the bitmap (xdr length plus bitmasks) and... | bf118a342f10dafe44b14451a1392c3254629a1f | linux | bigvul | 1 | null | null | null |
dm: do not forward ioctls from logical volumes to the underlying device
A logical volume can map to just part of underlying physical volume.
In this case, it must be treated like a partition.
Based on a patch from Alasdair G Kergon.
Cc: Alasdair G Kergon <agk@redhat.com>
Cc: dm-devel@redhat.com
Signed-off-by: Paolo ... | ec8013beddd717d1740cfefb1a9b900deef85462 | linux | bigvul | 1 | null | null | null |
net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared
After the last patch, We are left in a state in which only drivers calling
ether_setup have IFF_TX_SKB_SHARING set (we assume that drivers touching real
hardware call ether_setup for their net_devices and don't hold any state in
their skbs. There... | 550fd08c2cebad61c548def135f67aba284c6162 | linux | bigvul | 1 | null | null | null |
oom: fix integer overflow of points in oom_badness
commit ff05b6f7ae762b6eb464183eec994b28ea09f6dd upstream.
An integer overflow will happen on 64bit archs if task's sum of rss,
swapents and nr_ptes exceeds (2^31)/1000 value. This was introduced by
commit
f755a04 oom: use pte pages in OOM score
where the oom score... | 56c6a8a4aadca809e04276eabe5552935c51387f | linux | bigvul | 1 | null | null | null |
jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer
journal_unmap_buffer()'s zap_buffer: code clears a lot of buffer head
state ala discard_buffer(), but does not touch _Delay or _Unwritten as
discard_buffer() does.
This can be problematic in some areas of the ext4 code which assume
that if they have found a ... | 15291164b22a357cb211b618adfef4fa82fc0de3 | linux | bigvul | 1 | null | null | null |
crypto: ghash - Avoid null pointer dereference if no key is set
The ghash_update function passes a pointer to gf128mul_4k_lle which will
be NULL if ghash_setkey is not called or if the most recent call to
ghash_setkey failed to allocate memory. This causes an oops. Fix this
up by returning an error code in the null ... | 7ed47b7d142ec99ad6880bbbec51e9f12b3af74c | linux | bigvul | 1 | null | null | null |
sysctl: restrict write access to dmesg_restrict
When dmesg_restrict is set to 1 CAP_SYS_ADMIN is needed to read the kernel
ring buffer. But a root user without CAP_SYS_ADMIN is able to reset
dmesg_restrict to 0.
This is an issue when e.g. LXC (Linux Containers) are used and complete
user space is running without CA... | bfdc0b497faa82a0ba2f9dddcf109231dd519fcc | linux | bigvul | 1 | null | null | null |
proc: fix oops on invalid /proc/<pid>/maps access
When m_start returns an error, the seq_file logic will still call m_stop
with that error entry, so we'd better make sure that we check it before
using it as a vma.
Introduced by commit ec6fd8a4355c ("report errors in /proc/*/*map*
sanely"), which replaced NULL with va... | 76597cd31470fa130784c78fadb4dab2e624a723 | linux | bigvul | 1 | null | null | null |
cifs: always do is_path_accessible check in cifs_mount
Currently, we skip doing the is_path_accessible check in cifs_mount if
there is no prefixpath. I have a report of at least one server however
that allows a TREE_CONNECT to a share that has a DFS referral at its
root. The reporter in this case was using a UNC that ... | 70945643722ffeac779d2529a348f99567fa5c33 | linux | bigvul | 1 | null | null | null |
b43: allocate receive buffers big enough for max frame len + offset
Otherwise, skb_put inside of dma_rx can fail...
https://bugzilla.kernel.org/show_bug.cgi?id=32042
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Acked-by: Larry Finger <Larry.Finger@lwfinger.net>
Cc: stable@kernel.org | c85ce65ecac078ab1a1835c87c4a6319cf74660a | linux | bigvul | 1 | null | null | null |
fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the
message processing could overrun and result in a "kernel BUG at
fs/fuse/dev.c:629!"
Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: stable@kern... | c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae | linux | bigvul | 1 | null | null | null |
remove div_long_long_rem
x86 is the only arch right now, which provides an optimized for
div_long_long_rem and it has the downside that one has to be very careful that
the divide doesn't overflow.
The API is a little akward, as the arguments for the unsigned divide are
signed. The signed version also doesn't handle ... | f8bd2258e2d520dff28c855658bd24bdafb5102d | linux | bigvul | 1 | null | null | null |
cifs: fix possible memory corruption in CIFSFindNext
The name_len variable in CIFSFindNext is a signed int that gets set to
the resume_name_len in the cifs_search_info. The resume_name_len however
is unsigned and for some infolevels is populated directly from a 32 bit
value sent by the server.
If the server sends a v... | 9438fabb73eb48055b58b89fc51e0bc4db22fabd | linux | bigvul | 1 | null | null | null |
net: Compute protocol sequence numbers and fragment IDs using MD5.
Computers have become a lot faster since we compromised on the
partial MD4 hash which we use currently for performance reasons.
MD5 is a much safer choice, and is inline with both RFC1948 and
other ISS generators (OpenBSD, Solaris, etc.)
Furthermore,... | 6e5714eaf77d79ae1c8b47e3e040ff5411b717ec | linux | bigvul | 1 | null | null | null |
perf: Remove the nmi parameter from the swevent and overflow interface
The nmi parameter indicated if we could do wakeups from the current
context, if not, we would set some state and self-IPI and let the
resulting interrupt do the wakeup.
For the various event classes:
- hardware: nmi=0; PMI is in fact an NMI or ... | a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | linux | bigvul | 1 | null | null | null |
[SCSI] pmcraid: reject negative request size
There's a code path in pmcraid that can be reached via device ioctl that
causes all sorts of ugliness, including heap corruption or triggering the
OOM killer due to consecutive allocation of large numbers of pages.
First, the user can call pmcraid_chr_ioctl(), with a type
... | b5b515445f4f5a905c5dd27e6e682868ccd6c09d | linux | bigvul | 1 | null | null | null |
af_packet: prevent information leak
In 2.6.27, commit 393e52e33c6c2 (packet: deliver VLAN TCI to userspace)
added a small information leak.
Add padding field and make sure its zeroed before copy to user.
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
CC: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S... | 13fcb7bd322164c67926ffe272846d4860196dc6 | linux | bigvul | 1 | null | null | null |
xtensa: prevent arbitrary read in ptrace
Prevent an arbitrary kernel read. Check the user pointer with access_ok()
before copying data in.
[akpm@linux-foundation.org: s/EIO/EFAULT/]
Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
Cc: Christian Zankel <chris@zankel.net>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc:... | 0d0138ebe24b94065580bd2601f8bb7eb6152f56 | linux | bigvul | 1 | null | null | null |
ipv6: make fragment identifications less predictable
IPv6 fragment identification generation is way beyond what we use for
IPv4 : It uses a single generator. Its not scalable and allows DOS
attacks.
Now inetpeer is IPv6 aware, we can use it to provide a more secure and
scalable frag ident generator (per destination, ... | 87c48fa3b4630905f98268dde838ee43626a060c | linux | bigvul | 1 | null | null | null |
perf, x86: Fix Intel fixed counters base initialization
The following patch solves the problems introduced by Robert's
commit 41bf498 and reported by Arun Sharma. This commit gets rid
of the base + index notation for reading and writing PMU msrs.
The problem is that for fixed counters, the new calculation for
the bas... | fc66c5210ec2539e800e87d7b3a985323c7be96e | linux | bigvul | 1 | null | null | null |
TOMOYO: Fix oops in tomoyo_mount_acl().
In tomoyo_mount_acl() since 2.6.36, kern_path() was called without checking
dev_name != NULL. As a result, an unprivileged user can trigger oops by issuing
mount(NULL, "/", "ext3", 0, NULL) request.
Fix this by checking dev_name != NULL before calling kern_path(dev_name).
Signe... | 4e78c724d47e2342aa8fde61f6b8536f662f795f | linux | bigvul | 1 | null | null | null |
nl80211: fix check for valid SSID size in scan operations
In both trigger_scan and sched_scan operations, we were checking for
the SSID length before assigning the value correctly. Since the
memory was just kzalloc'ed, the check was always failing and SSID with
over 32 characters were allowed to go through.
This was... | 208c72f4fe44fe09577e7975ba0e7fa0278f3d03 | linux | bigvul | 1 | null | null | null |
mm: avoid wrapping vm_pgoff in mremap()
The normal mmap paths all avoid creating a mapping where the pgoff
inside the mapping could wrap around due to overflow. However, an
expanding mremap() can take such a non-wrapping mapping and make it
bigger and cause a wrapping condition.
Noticed by Robert Swiecki when runnin... | 982134ba62618c2d69fbbbd166d0a11ee3b7e3d8 | linux | bigvul | 1 | null | null | null |
proc: restrict access to /proc/PID/io
/proc/PID/io may be used for gathering private information. E.g. for
openssh and vsftpd daemons wchars/rchars may be used to learn the
precise password length. Restrict it to processes being able to ptrace
the target process.
ptrace_may_access() is needed to prevent keeping op... | 1d1221f375c94ef961ba8574ac4f85c8870ddd51 | linux | bigvul | 1 | null | null | null |