Dataset Viewer
Auto-converted to Parquet Duplicate
commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
[glyphstring] Handle overflow with very long glyphstrings
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
pango
bigvul
1
null
null
null
Don't shell-interpret \@SELECTED_URI (fixes FS#240)
9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975
uzbl
bigvul
1
null
null
null
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
beanstalkd
bigvul
1
null
null
null
Check if an SSL certificate matches the hostname of the server we are connecting to git-svn-id: http://svn.irssi.org/repos/irssi/trunk@5104 dbcabf3a-b0e7-0310-adc4-f8d773084564
85bbc05b21678e80423815d2ef1dfe26208491ab
irssi-proxy
bigvul
1
null
null
null
Use strncmp when checking for large ascii multigets.
d9cd01ede97f4145af9781d448c62a3318952719
memcached
bigvul
1
null
null
null
disable Uzbl javascript object because of security problem.
1958b52d41cba96956dc1995660de49525ed1047
uzbl
bigvul
1
null
null
null
Do not attempt to decode APE file with no frames This fixes invalid reads/writes with this sample: http://packetstorm.linuxsecurity.com/1103-exploits/vlc105-dos.txt
8312e3fc9041027a33c8bc667bb99740fdf41dd5
ffmpeg
bigvul
1
null
null
null
Flush the command buffer after switching to TLS. Fixes a flaw similar to CVE-2011-0411.
65c4d4ad331e94661de763e9b5304d28698999c4
pure-ftpd
bigvul
1
null
null
null
Fix buffer size checking Yes, this means we've re-introduced CVE-2005-3534. Sigh.
3ef52043861ab16352d49af89e048ba6339d6df8
nbd
bigvul
1
null
null
null
tools: hv: Netlink source address validation allows DoS The source code without this patch caused hypervkvpd to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the sysl...
95a69adab9acfc3981c504737a2b6578e4d846ef
linux
bigvul
1
null
null
null
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
linux
bigvul
1
null
null
null
net: fix divide by zero in tcp algorithm illinois Reading TCP stats when using TCP Illinois congestion control algorithm can cause a divide by zero kernel oops. The division by zero occur in tcp_illinois_info() at: do_div(t, ca->cnt_rtt); where ca->cnt_rtt can become zero (when rtt_reset is called) Steps to Reprodu...
8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
linux
bigvul
1
null
null
null
ext4: race-condition protection for ext4_convert_unwritten_extents_endio We assumed that at the time we call ext4_convert_unwritten_extents_endio() extent in question is fully inside [map.m_lblk, map->m_len] because it was already split during submission. But this may not be true due to a race between writeback vs fa...
dee1f973ca341c266229faa5a1a5bb268bed3531
linux
bigvul
1
null
null
null
Fix order of arguments to compat_put_time[spec|val] Commit 644595f89620 ("compat: Handle COMPAT_USE_64BIT_TIME in net/socket.c") introduced a bug where the helper functions to take either a 64-bit or compat time[spec|val] got the arguments in the wrong order, passing the kernel stack pointer off as a user pointer (and...
ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d
linux
bigvul
1
null
null
null
ipv6: discard overlapping fragment RFC5722 prohibits reassembling fragments when some data overlaps. Bug spotted by Zhang Zuotao <zuotao.zhang@6wind.com>. Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com> Signed-off-by: David S. Miller <davem@davemloft.net>
70789d7052239992824628db8133de08dc78e593
linux
bigvul
1
null
null
null
inet: add RCU protection to inet->opt We lack proper synchronization to manipulate inet->opt ip_options Problem is ip_make_skb() calls ip_setup_cork() and ip_setup_cork() possibly makes a copy of ipc->opt (struct ip_options), without any protection against another thread manipulating inet->opt. Another thread can ch...
f6d8bd051c391c1c0458a30b2a7abcd939329259
linux
bigvul
1
null
null
null
Fixed possibility of Unsolicited Dialback Attacks
aabcffae560d5fd00cd1d2ffce5d760353cf0a4d
jabberd2
bigvul
1
null
null
null
af_netlink: force credentials passing [CVE-2012-3520] Pablo Neira Ayuso discovered that avahi and potentially NetworkManager accept spoofed Netlink messages because of a kernel bug. The kernel passes all-zero SCM_CREDENTIALS ancillary data to the receiver if the sender did not provide such data, instead of not includ...
e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
linux
bigvul
1
null
null
null
mm: Hold a file reference in madvise_remove Otherwise the code races with munmap (causing a use-after-free of the vma) or with close (causing a use-after-free of the struct file). The bug was introduced by commit 90ed52ebe481 ("[PATCH] holepunch: fix mmap_sem i_mutex deadlock") Cc: Hugh Dickins <hugh@veritas.com> Cc...
9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb
linux
bigvul
1
null
null
null
[PATCH] xacct_add_tsk: fix pure theoretical ->mm use-after-free Paranoid fix. The task can free its ->mm after the 'if (p->mm)' check. Signed-off-by: Oleg Nesterov <oleg@tv-sign.ru> Cc: Shailabh Nagar <nagar@watson.ibm.com> Cc: Balbir Singh <balbir@in.ibm.com> Cc: Jay Lan <jlan@sgi.com> Signed-off-by: Andrew Morton <...
f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9
linux
bigvul
1
null
null
null
rds: set correct msg_namelen Jay Fenlason (fenlason@redhat.com) found a bug, that recvfrom() on an RDS socket can return the contents of random kernel memory to userspace if it was called with a address length larger than sizeof(struct sockaddr_in). rds_recvmsg() also fails to set the addr_len paramater properly befor...
06b6a1cf6e776426766298d055bb3991957d90a7
linux
bigvul
1
null
null
null
sfc: Fix maximum number of TSO segments and minimum TX queue size [ Upstream commit 7e6d06f0de3f74ca929441add094518ae332257c ] Currently an skb requiring TSO may not fit within a minimum-size TX queue. The TX queue selected for the skb may stall and trigger the TX watchdog repeatedly (since the problem skb will be r...
68cb695ccecf949d48949e72f8ce591fdaaa325c
linux
bigvul
1
null
null
null
udf: Avoid run away loop when partition table length is corrupted Check provided length of partition table so that (possibly maliciously) corrupted partition table cannot cause accessing data beyond current buffer. Signed-off-by: Jan Kara <jack@suse.cz>
adee11b2085bee90bd8f4f52123ffb07882d6256
linux
bigvul
1
null
null
null
epoll: clear the tfile_check_list on -ELOOP An epoll_ctl(,EPOLL_CTL_ADD,,) operation can return '-ELOOP' to prevent circular epoll dependencies from being created. However, in that case we do not properly clear the 'tfile_check_list'. Thus, add a call to clear_tfile_check_list() for the -ELOOP case. Signed-off-by: ...
13d518074a952d33d47c428419693f63389547e9
linux
bigvul
1
null
null
null
cred: copy_process() should clear child->replacement_session_keyring keyctl_session_to_parent(task) sets ->replacement_session_keyring, it should be processed and cleared by key_replace_session_keyring(). However, this task can fork before it notices TIF_NOTIFY_RESUME and the new child gets the bogus ->replacement_se...
79549c6dfda0603dba9a70a53467ce62d9335c33
linux
bigvul
1
null
null
null
netfilter: nf_conntrack_reasm: properly handle packets fragmented into a single fragment When an ICMPV6_PKT_TOOBIG message is received with a MTU below 1280, all further packets include a fragment header. Unlike regular defragmentation, conntrack also needs to "reassemble" those fragments in order to obtain a packet ...
9e2dcf72023d1447f09c47d77c99b0c49659e5ce
linux
bigvul
1
null
null
null
Avoid overflowing allocation size in CallMalloc() The wraparound could happen if USE_MAGIC_HEADERS is enabled.
1a759756639ab7543b650a10c2d77a0ffc7a2000
nedmalloc
bigvul
1
null
null
null
Fix calloc() overflow * malloc.c (calloc): Check multiplication overflow in calloc(), assuming REDIRECT_MALLOC.
e10c1eb9908c2774c16b3148b30d2f3823d66a9a
bdwgc
bigvul
1
null
null
null
Tools: hv: verify origin of netlink connector message The SuSE security team suggested to use recvfrom instead of recv to be certain that the connector message is originated from kernel. CVE-2012-2669 Signed-off-by: Olaf Hering <olaf@aepfle.de> Signed-off-by: Marcus Meissner <meissner@suse.de> Signed-off-by: Sebasti...
bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c
linux
bigvul
1
null
null
null
hugetlb: fix resv_map leak in error path When called for anonymous (non-shared) mappings, hugetlb_reserve_pages() does a resv_map_alloc(). It depends on code in hugetlbfs's vm_ops->close() to release that allocation. However, in the mmap() failure path, we do a plain unmap_region() without the remove_vma() which act...
c50ac050811d6485616a193eb0f37bfbd191cc89
linux
bigvul
1
null
null
null
Cap escape sequence parameters to prevent long loops. Fixes #271 github issue.
9791768705528e911bfca6c4d8aa88139035060e
mosh
bigvul
1
null
null
null
drm/i915: fix integer overflow in i915_gem_do_execbuffer() On 32-bit systems, a large args->num_cliprects from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 432e58ed ("drm/i915: Avoid allocation for execbuffer object list"). Signed-...
44afb3a04391a74309d16180d1e4f8386fdfa745
linux
bigvul
1
null
null
null
drm/i915: fix integer overflow in i915_gem_execbuffer2() On 32-bit systems, a large args->buffer_count from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 8408c282 ("drm/i915: First try a normal large kmalloc for the temporary exec bu...
ed8cd3b2cd61004cab85380c52b1817aca1ca49b
linux
bigvul
1
null
null
null
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
20e0fa98b751facf9a1101edaefbc19c82616a68
linux
bigvul
1
null
null
null
mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition When holding the mmap_sem for reading, pmd_offset_map_lock should only run on a pmd_t that has been read atomically from the pmdp pointer, otherwise we may read only half of it leading to this crash. PID: 11679 TASK: f06e8000 CPU: 3 CO...
26c191788f18129af0eb32a358cdaea0c7479626
linux
bigvul
1
null
null
null
hfsplus: Fix potential buffer overflows Commit ec81aecb2966 ("hfs: fix a potential buffer overflow") fixed a few potential buffer overflows in the hfs filesystem. But as Timo Warns pointed out, these changes also need to be made on the hfsplus filesystem as well. Reported-by: Timo Warns <warns@pre-sense.de> Acked-by...
6f24f892871acc47b40dd594c63606a17c714f77
linux
bigvul
1
null
null
null
dl2k: Clean up rio_ioctl The dl2k driver's rio_ioctl call has a few issues: - No permissions checking - Implements SIOCGMIIREG and SIOCGMIIREG using the SIOCDEVPRIVATE numbers - Has a few ioctls that may have been used for debugging at one point but have no place in the kernel proper. This patch removes all but the...
1bb57e940e1958e40d51f2078f50c3a96a9b2d75
linux
bigvul
1
null
null
null
net: sock: validate data_len before allocating skb in sock_alloc_send_pskb() We need to validate the number of pages consumed by data_len, otherwise frags array could be overflowed by userspace. So this patch validate data_len and return -EMSGSIZE when data_len may occupies more frags than MAX_SKB_FRAGS. Signed-off-b...
cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc
linux
bigvul
1
null
null
null
hugepages: fix use after free bug in "quota" handling hugetlbfs_{get,put}_quota() are badly named. They don't interact with the general quota handling code, and they don't much resemble its behaviour. Rather than being about maintaining limits on on-disk block usage by particular users, they are instead about maintai...
90481622d75715bfcb68501280a917dbfe516029
linux
bigvul
1
null
null
null
procfs: fix a vfsmount longterm reference leak kern_mount() doesn't pair with plain mntput()... Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
905ad269c55fc62bee3da29f7b1d1efeba8aa1e1
linux
bigvul
1
null
null
null
fcaps: clear the same personality flags as suid when fcaps are used If a process increases permissions using fcaps all of the dangerous personality flags which are cleared for suid apps should also be cleared. Thus programs given priviledge with fcaps will continue to have address space randomization enabled even if t...
d52fc5dde171f030170a6cb78034d166b13c9445
linux
bigvul
1
null
null
null
KVM: unmap pages from the iommu when slots are removed commit 32f6daad4651a748a58a3ab6da0611862175722f upstream. We've been adding new mappings, but not destroying old mappings. This can lead to a page leak as pages are pinned using get_user_pages, but only unpinned with put_page if they still exist in the memslots l...
09ca8e1173bcb12e2a449698c9ae3b86a8a10195
linux
bigvul
1
null
null
null
ext4: fix undefined behavior in ext4_fill_flex_info() Commit 503358ae01b70ce6909d19dd01287093f6b6271c ("ext4: avoid divide by zero when trying to mount a corrupted file system") fixes CVE-2009-4307 by performing a sanity check on s_log_groups_per_flex, since it can be set to a bogus value by an attacker. sbi->s_log_...
d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
linux
bigvul
1
null
null
null
Fix Win32 RPC Crashes.
8864019f6d88b13d3442843d9e6ebeb8dd938831
bitcoin
bigvul
1
null
null
null
Merge pull request #1 from nenolod/insp20 DNS resolver hardening (insp20 branch)
fe7dbd2c104c37f6f3af7d9f1646a3c332aea4a4
inspircd
bigvul
1
null
null
null
KVM: Ensure all vcpus are consistent with in-kernel irqchip settings (cherry picked from commit 3e515705a1f46beb1c942bb8043c16f8ac7b1e9e) If some vcpus are created before KVM_CREATE_IRQCHIP, then irqchip_in_kernel() and vcpu->arch.apic will be inconsistent, leading to potential NULL pointer dereferences. Fix by: - e...
9c895160d25a76c21b65bad141b08e8d4f99afef
linux
bigvul
1
null
null
null
Avoid uint overflow in case the length + index is over UINT_MAX
dcdf4fd954e3213c355746fa15b7480461972308
taglib
bigvul
1
null
null
null
[IPV6]: Fix slab corruption running ip6sic From: Eric Sesterhenn <snakebyte@gmx.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
d0772b70faaf8e9f2013b6c4273d94d5eac8047a
linux
bigvul
1
null
null
null
Fix bounds checks again.
1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b
file
bigvul
1
null
null
null
mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode commit 1a5a9906d4e8d1976b701f889d8f35d54b928f25 upstream. In some cases it may happen that pmd_none_or_clear_bad() is called with the mmap_sem hold in read mode. In those cases the huge page faults can allocate hugepmds under pmd_none_or_clea...
4a1d704194a441bf83c636004a479e01360ec850
linux
bigvul
1
null
null
null
refactor pyfribidi.c module pyfribidi.c is now compiled as _pyfribidi. This module only handles unicode internally and doesn't use the fribidi_utf8_to_unicode function (which can't handle 4 byte utf-8 sequences). This fixes the buffer overflow in issue #2. The code is now also much simpler: pyfribidi.c is down from 2...
d2860c655357975e7b32d84e6b45e98f0dcecd7a
pyfribidi
bigvul
1
null
null
null
mm: memcg: Correct unregistring of events attached to the same eventfd There is an issue when memcg unregisters events that were attached to the same eventfd: - On the first call mem_cgroup_usage_unregister_event() removes all events attached to a given eventfd, and if there were no events left, thresholds->prima...
371528caec553785c37f73fa3926ea0de84f986f
linux
bigvul
1
null
null
null
Be more careful when parsing Vorbis Comments
b3646a07348ffa276ea41a9dae03ddc63ea6c532
taglib
bigvul
1
null
null
null
Make sure to not try dividing by zero
77d61c6eca4d08b9b025738acf6b926cc750db23
taglib
bigvul
1
null
null
null
regset: Prevent null pointer reference on readonly regsets The regset common infrastructure assumed that regsets would always have .get and .set methods, but not necessarily .active methods. Unfortunately people have since written regsets without .set methods. Rather than putting in stub functions everywhere, handle ...
c8e252586f8d5de906385d8cf6385fee289a825e
linux
bigvul
1
null
null
null
cifs: fix dentry refcount leak when opening a FIFO on lookup commit 5bccda0ebc7c0331b81ac47d39e4b920b198b2cd upstream. The cifs code will attempt to open files on lookup under certain circumstances. What happens though if we find that the file we opened was actually a FIFO or other special file? Currently, the open ...
88d7d4e4a439f32acc56a6d860e415ee71d3df08
linux
bigvul
1
null
null
null
Null pointer deref in kadmind [CVE-2012-1013] The fix for #6626 could cause kadmind to dereference a null pointer if a create-principal request contains no password but does contain the KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix name"). Only clients authorized to create principals can trigger ...
c5be6209311d4a8f10fda37d0d3f876c1b33b77b
krb5
bigvul
1
null
null
null
kernel/sys.c: fix stack memory content leak via UNAME26 Calling uname() with the UNAME26 personality set allows a leak of kernel stack contents. This fixes it by defensively calculating the length of copy_to_user() call, making the len argument unsigned, and initializing the stack buffer to zero (now technically unne...
2702b1526c7278c4d65d78de209a465d4de2885e
linux
bigvul
1
null
null
null
block: Fix io_context leak after clone with CLONE_IO With CLONE_IO, copy_io() increments both ioc->refcount and ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount if ioc->nr_tasks reaches 0. Always call put_io_context() in exit_io_context(). Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com...
61cc74fbb87af6aa551a06a370590c9bc07e29d9
linux
bigvul
1
null
null
null
Explicitly remove file permissions for settings and DB
5632c35d6759f5e13a7dfe78e4ee6403ff6a8e3e
mumble
bigvul
1
null
null
null
Fixed stack based buffer overflow in transparent cookie encryption (see separate advisory)
73b1968ee30f6d9d2dae497544b910e68e114bfa
suhosin
bigvul
1
null
null
null
igmp: Avoid zero delay when receiving odd mixture of IGMP queries Commit 5b7c84066733c5dfb0e4016d939757b38de189e4 ('ipv4: correct IGMP behavior on v3 query during v2-compatibility mode') added yet another case for query parsing, which can result in max_delay = 0. Substitute a value of 1, as in the usual v3 case. Rep...
a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
linux
bigvul
1
null
null
null
Unused iocbs in a batch should not be accounted as active. commit 69e4747ee9727d660b88d7e1efe0f4afcb35db1b upstream. Since commit 080d676de095 ("aio: allocate kiocbs in batches") iocbs are allocated in a batch during processing of first iocbs. All iocbs in a batch are automatically added to ctx->active_reqs list and...
802f43594d6e4d2ac61086d239153c17873a0428
linux
bigvul
1
null
null
null
KVM: x86: fix missing checks in syscall emulation On hosts without this patch, 32bit guests will crash (and 64bit guests may behave in a wrong way) for example by simply executing following nasm-demo-application: [bits 32] global _start SECTION .text _start: syscall (I tested it with winxp and linux ...
c2226fc9e87ba3da060e47333657cd6616652b84
linux
bigvul
1
null
null
null
drm: integer overflow in drm_mode_dirtyfb_ioctl() There is a potential integer overflow in drm_mode_dirtyfb_ioctl() if userspace passes in a large num_clips. The call to kmalloc would allocate a small buffer, and the call to fb->funcs->dirty may result in a memory corruption. Reported-by: Haogang Chen <haogangchen@g...
a5cd335165e31db9dbab636fd29895d41da55dd2
linux
bigvul
1
null
null
null
xfs: validate acl count This prevents in-memory corruption and possible panics if the on-disk ACL is badly corrupted. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
linux
bigvul
1
null
null
null
CVE-2012-0037 Enforce entity loading policy in raptor_libxml_resolveEntity and raptor_libxml_getEntity by checking for file URIs and network URIs. Add RAPTOR_OPTION_LOAD_EXTERNAL_ENTITIES / loadExternalEntities for turning on loading of XML external entity loading, disabled by default. This affects all the parsers t...
a676f235309a59d4aa78eeffd2574ae5d341fcb0
raptor
bigvul
1
null
null
null
URL sanitize: reject URLs containing bad data Protocols (IMAP, POP3 and SMTP) that use the path part of a URL in a decoded manner now use the new Curl_urldecode() function to reject URLs with embedded control codes (anything that is or decodes to a byte value less than 32). URLs containing such codes could easily oth...
75ca568fa1c19de4c5358fed246686de8467c238
curl
bigvul
1
null
null
null
Move "exit_robust_list" into mm_release() We don't want to get rid of the futexes just at exit() time, we want to drop them when doing an execve() too, since that gets rid of the previous VM image too. Doing it at mm_release() time means that we automatically always do it when we disassociate a VM map from the task. ...
8141c7f3e7aee618312fa1c15109e1219de784a7
linux
bigvul
1
null
null
null
rose: Add length checks to CALL_REQUEST parsing Define some constant offsets for CALL_REQUEST based on the description at <http://www.techfest.com/networking/wan/x25plp.htm> and the definition of ROSE as using 10-digit (5-byte) addresses. Use them consistently. Validate all implicit and explicit facilities lengths. ...
e0bccd315db0c2f919e7fcf9cb60db21d9986f52
linux
bigvul
1
null
null
null
ROSE: prevent heap corruption with bad facilities When parsing the FAC_NATIONAL_DIGIS facilities field, it's possible for a remote host to provide more digipeaters than expected, resulting in heap corruption. Check against ROSE_MAX_DIGIS to prevent overflows, and abort facilities parsing on failure. Additionally, wh...
be20250c13f88375345ad99950190685eda51eb8
linux
bigvul
1
null
null
null
Sched: fix skip_clock_update optimization idle_balance() drops/retakes rq->lock, leaving the previous task vulnerable to set_tsk_need_resched(). Clear it after we return from balancing instead, and in setup_thread_stack() as well, so no successfully descheduled or never scheduled task has it set. Need resched confus...
f26f9aff6aaf67e9a430d16c266f91b13a5bff64
linux
bigvul
1
null
null
null
perf, powerpc: Handle events that raise an exception without overflowing Events on POWER7 can roll back if a speculative event doesn't eventually complete. Unfortunately in some rare cases they will raise a performance monitor exception. We need to catch this to ensure we reset the PMC. In all cases the PMC will be 25...
0837e3242c73566fc1c0196b4ec61779c25ffc93
linux
bigvul
1
null
null
null
sendmmsg/sendmsg: fix unsafe user pointer access Dereferencing a user pointer directly from kernel-space without going through the copy_from_user family of functions is a bad idea. Two of such usages can be found in the sendmsg code path called from sendmmsg, added by commit c71d8ebe7a4496fb7231151cb70a6baa0cb56f9a u...
bc909d9ddbf7778371e36a651d6e4194b1cc7d4c
linux
bigvul
1
null
null
null
ipv6: udp: fix the wrong headroom check At this point, skb->data points to skb_transport_header. So, headroom check is wrong. For some case:bridge(UFO is on) + eth device(UFO is off), there is no enough headroom for IPv6 frag head. But headroom check is always false. This will bring about data be moved to there prio...
a9cf73ea7ff78f52662c8658d93c226effbbedde
linux
bigvul
1
null
null
null
NFSv4: Convert the open and close ops to use fmode Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
dc0b027dfadfcb8a5504f7d8052754bf8d501ab9
linux
bigvul
1
null
null
null
NFSv4: include bitmap in nfsv4 get acl data The NFSv4 bitmap size is unbounded: a server can return an arbitrary sized bitmap in an FATTR4_WORD0_ACL request. Replace using the nfs4_fattr_bitmap_maxsz as a guess to the maximum bitmask returned by a server with the inclusion of the bitmap (xdr length plus bitmasks) and...
bf118a342f10dafe44b14451a1392c3254629a1f
linux
bigvul
1
null
null
null
dm: do not forward ioctls from logical volumes to the underlying device A logical volume can map to just part of underlying physical volume. In this case, it must be treated like a partition. Based on a patch from Alasdair G Kergon. Cc: Alasdair G Kergon <agk@redhat.com> Cc: dm-devel@redhat.com Signed-off-by: Paolo ...
ec8013beddd717d1740cfefb1a9b900deef85462
linux
bigvul
1
null
null
null
net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared After the last patch, We are left in a state in which only drivers calling ether_setup have IFF_TX_SKB_SHARING set (we assume that drivers touching real hardware call ether_setup for their net_devices and don't hold any state in their skbs. There...
550fd08c2cebad61c548def135f67aba284c6162
linux
bigvul
1
null
null
null
oom: fix integer overflow of points in oom_badness commit ff05b6f7ae762b6eb464183eec994b28ea09f6dd upstream. An integer overflow will happen on 64bit archs if task's sum of rss, swapents and nr_ptes exceeds (2^31)/1000 value. This was introduced by commit f755a04 oom: use pte pages in OOM score where the oom score...
56c6a8a4aadca809e04276eabe5552935c51387f
linux
bigvul
1
null
null
null
jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer journal_unmap_buffer()'s zap_buffer: code clears a lot of buffer head state ala discard_buffer(), but does not touch _Delay or _Unwritten as discard_buffer() does. This can be problematic in some areas of the ext4 code which assume that if they have found a ...
15291164b22a357cb211b618adfef4fa82fc0de3
linux
bigvul
1
null
null
null
crypto: ghash - Avoid null pointer dereference if no key is set The ghash_update function passes a pointer to gf128mul_4k_lle which will be NULL if ghash_setkey is not called or if the most recent call to ghash_setkey failed to allocate memory. This causes an oops. Fix this up by returning an error code in the null ...
7ed47b7d142ec99ad6880bbbec51e9f12b3af74c
linux
bigvul
1
null
null
null
sysctl: restrict write access to dmesg_restrict When dmesg_restrict is set to 1 CAP_SYS_ADMIN is needed to read the kernel ring buffer. But a root user without CAP_SYS_ADMIN is able to reset dmesg_restrict to 0. This is an issue when e.g. LXC (Linux Containers) are used and complete user space is running without CA...
bfdc0b497faa82a0ba2f9dddcf109231dd519fcc
linux
bigvul
1
null
null
null
proc: fix oops on invalid /proc/<pid>/maps access When m_start returns an error, the seq_file logic will still call m_stop with that error entry, so we'd better make sure that we check it before using it as a vma. Introduced by commit ec6fd8a4355c ("report errors in /proc/*/*map* sanely"), which replaced NULL with va...
76597cd31470fa130784c78fadb4dab2e624a723
linux
bigvul
1
null
null
null
cifs: always do is_path_accessible check in cifs_mount Currently, we skip doing the is_path_accessible check in cifs_mount if there is no prefixpath. I have a report of at least one server however that allows a TREE_CONNECT to a share that has a DFS referral at its root. The reporter in this case was using a UNC that ...
70945643722ffeac779d2529a348f99567fa5c33
linux
bigvul
1
null
null
null
b43: allocate receive buffers big enough for max frame len + offset Otherwise, skb_put inside of dma_rx can fail... https://bugzilla.kernel.org/show_bug.cgi?id=32042 Signed-off-by: John W. Linville <linville@tuxdriver.com> Acked-by: Larry Finger <Larry.Finger@lwfinger.net> Cc: stable@kernel.org
c85ce65ecac078ab1a1835c87c4a6319cf74660a
linux
bigvul
1
null
null
null
fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message FUSE_NOTIFY_INVAL_ENTRY didn't check the length of the write so the message processing could overrun and result in a "kernel BUG at fs/fuse/dev.c:629!" Reported-by: Han-Wen Nienhuys <hanwenn@gmail.com> Signed-off-by: Miklos Szeredi <mszeredi@suse.cz> CC: stable@kern...
c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae
linux
bigvul
1
null
null
null
remove div_long_long_rem x86 is the only arch right now, which provides an optimized for div_long_long_rem and it has the downside that one has to be very careful that the divide doesn't overflow. The API is a little akward, as the arguments for the unsigned divide are signed. The signed version also doesn't handle ...
f8bd2258e2d520dff28c855658bd24bdafb5102d
linux
bigvul
1
null
null
null
cifs: fix possible memory corruption in CIFSFindNext The name_len variable in CIFSFindNext is a signed int that gets set to the resume_name_len in the cifs_search_info. The resume_name_len however is unsigned and for some infolevels is populated directly from a 32 bit value sent by the server. If the server sends a v...
9438fabb73eb48055b58b89fc51e0bc4db22fabd
linux
bigvul
1
null
null
null
net: Compute protocol sequence numbers and fragment IDs using MD5. Computers have become a lot faster since we compromised on the partial MD4 hash which we use currently for performance reasons. MD5 is a much safer choice, and is inline with both RFC1948 and other ISS generators (OpenBSD, Solaris, etc.) Furthermore,...
6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
linux
bigvul
1
null
null
null
perf: Remove the nmi parameter from the swevent and overflow interface The nmi parameter indicated if we could do wakeups from the current context, if not, we would set some state and self-IPI and let the resulting interrupt do the wakeup. For the various event classes: - hardware: nmi=0; PMI is in fact an NMI or ...
a8b0ca17b80e92faab46ee7179ba9e99ccb61233
linux
bigvul
1
null
null
null
[SCSI] pmcraid: reject negative request size There's a code path in pmcraid that can be reached via device ioctl that causes all sorts of ugliness, including heap corruption or triggering the OOM killer due to consecutive allocation of large numbers of pages. First, the user can call pmcraid_chr_ioctl(), with a type ...
b5b515445f4f5a905c5dd27e6e682868ccd6c09d
linux
bigvul
1
null
null
null
af_packet: prevent information leak In 2.6.27, commit 393e52e33c6c2 (packet: deliver VLAN TCI to userspace) added a small information leak. Add padding field and make sure its zeroed before copy to user. Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com> CC: Patrick McHardy <kaber@trash.net> Signed-off-by: David S...
13fcb7bd322164c67926ffe272846d4860196dc6
linux
bigvul
1
null
null
null
xtensa: prevent arbitrary read in ptrace Prevent an arbitrary kernel read. Check the user pointer with access_ok() before copying data in. [akpm@linux-foundation.org: s/EIO/EFAULT/] Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com> Cc: Christian Zankel <chris@zankel.net> Cc: Oleg Nesterov <oleg@redhat.com> Cc:...
0d0138ebe24b94065580bd2601f8bb7eb6152f56
linux
bigvul
1
null
null
null
ipv6: make fragment identifications less predictable IPv6 fragment identification generation is way beyond what we use for IPv4 : It uses a single generator. Its not scalable and allows DOS attacks. Now inetpeer is IPv6 aware, we can use it to provide a more secure and scalable frag ident generator (per destination, ...
87c48fa3b4630905f98268dde838ee43626a060c
linux
bigvul
1
null
null
null
perf, x86: Fix Intel fixed counters base initialization The following patch solves the problems introduced by Robert's commit 41bf498 and reported by Arun Sharma. This commit gets rid of the base + index notation for reading and writing PMU msrs. The problem is that for fixed counters, the new calculation for the bas...
fc66c5210ec2539e800e87d7b3a985323c7be96e
linux
bigvul
1
null
null
null
TOMOYO: Fix oops in tomoyo_mount_acl(). In tomoyo_mount_acl() since 2.6.36, kern_path() was called without checking dev_name != NULL. As a result, an unprivileged user can trigger oops by issuing mount(NULL, "/", "ext3", 0, NULL) request. Fix this by checking dev_name != NULL before calling kern_path(dev_name). Signe...
4e78c724d47e2342aa8fde61f6b8536f662f795f
linux
bigvul
1
null
null
null
nl80211: fix check for valid SSID size in scan operations In both trigger_scan and sched_scan operations, we were checking for the SSID length before assigning the value correctly. Since the memory was just kzalloc'ed, the check was always failing and SSID with over 32 characters were allowed to go through. This was...
208c72f4fe44fe09577e7975ba0e7fa0278f3d03
linux
bigvul
1
null
null
null
mm: avoid wrapping vm_pgoff in mremap() The normal mmap paths all avoid creating a mapping where the pgoff inside the mapping could wrap around due to overflow. However, an expanding mremap() can take such a non-wrapping mapping and make it bigger and cause a wrapping condition. Noticed by Robert Swiecki when runnin...
982134ba62618c2d69fbbbd166d0a11ee3b7e3d8
linux
bigvul
1
null
null
null
proc: restrict access to /proc/PID/io /proc/PID/io may be used for gathering private information. E.g. for openssh and vsftpd daemons wchars/rchars may be used to learn the precise password length. Restrict it to processes being able to ptrace the target process. ptrace_may_access() is needed to prevent keeping op...
1d1221f375c94ef961ba8574ac4f85c8870ddd51
linux
bigvul
1
null
null
null
End of preview. Expand in Data Studio

Dataset Card for "bigvul_devign_cvefixes_neuralsentry_commits"

More Information needed

Downloads last month
9

Models trained or fine-tuned on neuralsentry/bigvul_devign_cvefixes_neuralsentry_commits