idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3,649 | radare2 | 40b021ba29c8f90ccf7c879fde2580bc73a17e8e | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/40b021ba29c8f90ccf7c879fde2580bc73a17e8e | None | 1 | static bool r_bin_mdmp_init_directory(struct r_bin_mdmp_obj *obj) {
int i;
ut8 *directory_base;
struct minidump_directory *entry;
directory_base = obj->b->buf + obj->hdr->stream_directory_rva;
sdb_num_set (obj->kv, "mdmp_directory.offset",
obj->hdr->stream_directory_rva, 0);
sdb_set (obj->kv, "mdmp_direc... | 275,785,464,801,853,400,000,000,000,000,000,000,000 | mdmp.c | 317,085,147,769,769,330,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14016 | The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Mini Crash Dump file. | https://nvd.nist.gov/vuln/detail/CVE-2018-14016 |
3,651 | libpng | 8a05766cb74af05c04c53e6c9d60c13fc4d59bf2 | https://github.com/glennrp/libpng | https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2 | [libpng16] Fix the calculation of row_factor in png_check_chunk_length
(Bug report by Thuan Pham, SourceForge issue #278) | 1 | png_check_chunk_length(png_const_structrp png_ptr, const png_uint_32 length)
{
png_alloc_size_t limit = PNG_UINT_31_MAX;
# ifdef PNG_SET_USER_LIMITS_SUPPORTED
if (png_ptr->user_chunk_malloc_max > 0 &&
png_ptr->user_chunk_malloc_max < limit)
limit = png_ptr->user_chunk_malloc_max;
# elif PNG_USER_CHU... | 110,259,438,980,219,460,000,000,000,000,000,000,000 | pngrutil.c | 326,867,964,072,458,030,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-13785 | In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-13785 |
3,652 | linux | 9f645bcc566a1e9f921bdae7528a01ced5bc3713 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9f645bcc566a1e9f921bdae7528a01ced5bc3713 | video: uvesafb: Fix integer overflow in allocation
cmap->len can get close to INT_MAX/2, allowing for an integer overflow in
allocation. This uses kmalloc_array() instead to catch the condition.
Reported-by: Dr Silvio Cesare of InfoSect <silvio.cesare@gmail.com>
Fixes: 8bdb3a2d7df48 ("uvesafb: the driver core")
Cc: s... | 1 | static int uvesafb_setcmap(struct fb_cmap *cmap, struct fb_info *info)
{
struct uvesafb_pal_entry *entries;
int shift = 16 - dac_width;
int i, err = 0;
if (info->var.bits_per_pixel == 8) {
if (cmap->start + cmap->len > info->cmap.start +
info->cmap.len || cmap->start < info->cmap.start)
return -EINVAL... | 129,461,505,887,171,650,000,000,000,000,000,000,000 | uvesafb.c | 8,702,348,276,085,379,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-13406 | An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used. | https://nvd.nist.gov/vuln/detail/CVE-2018-13406 |
3,653 | linux | 0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7 | Fix up non-directory creation in SGID directories
sgid directories have special semantics, making newly created files in
the directory belong to the group of the directory, and newly created
subdirectories will also become sgid. This is historically used for
group-shared directories.
But group directories writable b... | 1 | void inode_init_owner(struct inode *inode, const struct inode *dir,
umode_t mode)
{
inode->i_uid = current_fsuid();
if (dir && dir->i_mode & S_ISGID) {
inode->i_gid = dir->i_gid;
if (S_ISDIR(mode))
mode |= S_ISGID;
} else
inode->i_gid = current_fsgid();
inode->i_mode = mode;
}
| 215,180,090,082,961,630,000,000,000,000,000,000,000 | inode.c | 212,299,787,291,086,200,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2018-13405 | The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain... | https://nvd.nist.gov/vuln/detail/CVE-2018-13405 |
3,654 | FFmpeg | 00e8181bd97c834fe60751b0c511d4bb97875f78 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/00e8181bd97c834fe60751b0c511d4bb97875f78 | avcodec/ac3_parser: Check init_get_bits8() for failure
Fixes: null pointer dereference
Fixes: ffmpeg_crash_6.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Reviewed-by: Paul B Mahol <onemda@gmail.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | int avpriv_ac3_parse_header(AC3HeaderInfo **phdr, const uint8_t *buf,
size_t size)
{
GetBitContext gb;
AC3HeaderInfo *hdr;
int err;
if (!*phdr)
*phdr = av_mallocz(sizeof(AC3HeaderInfo));
if (!*phdr)
return AVERROR(ENOMEM);
hdr = *phdr;
init_ge... | 236,477,656,578,978,820,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-13303 | In FFmpeg 4.0.1, a missing check for failure of a call to init_get_bits8() in the avpriv_ac3_parse_header function in libavcodec/ac3_parser.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-13303 |
3,655 | FFmpeg | 2aa9047486dbff12d9e040f917e5f799ed2fd78b | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2aa9047486dbff12d9e040f917e5f799ed2fd78b | avcodec/mpeg4videodec: Check read profile before setting it
Fixes: null pointer dereference
Fixes: ffmpeg_crash_7.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
unsigned startcode, v;
int ret;
int vol = 0;
/* search next start code */
align_get_bits(gb);
if (!s->studio_profile && s->avctx->bits_per_raw_sample != 8)
s->avctx->bits_per_... | 328,896,097,922,084,930,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-13301 | In FFmpeg 4.0.1, due to a missing check of a profile value before setting it, the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-13301 |
3,657 | linux | 23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | xfs: More robust inode extent count validation
When the inode is in extent format, it can't have more extents that
fit in the inode fork. We don't currenty check this, and so this
corruption goes unnoticed by the inode verifiers. This can lead to
crashes operating on invalid in-memory structures.
Attempts to access s... | 1 | xfs_dinode_verify(
struct xfs_mount *mp,
xfs_ino_t ino,
struct xfs_dinode *dip)
{
xfs_failaddr_t fa;
uint16_t mode;
uint16_t flags;
uint64_t flags2;
uint64_t di_size;
if (dip->di_magic != cpu_to_be16(XFS_DINODE_MAGIC))
return __this_address;
/* Verify v3 integrity information first */
if (dip->di... | 274,742,324,962,726,900,000,000,000,000,000,000,000 | xfs_inode_buf.c | 103,496,325,547,574,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-13095 | An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. | https://nvd.nist.gov/vuln/detail/CVE-2018-13095 |
3,658 | linux | bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a | xfs: don't call xfs_da_shrink_inode with NULL bp
xfs_attr3_leaf_create may have errored out before instantiating a buffer,
for example if the blkno is out of range. In that case there is no work
to do to remove it, and in fact xfs_da_shrink_inode will lead to an oops
if we try.
This also seems to fix a flaw where th... | 1 | xfs_attr_shortform_to_leaf(
struct xfs_da_args *args,
struct xfs_buf **leaf_bp)
{
xfs_inode_t *dp;
xfs_attr_shortform_t *sf;
xfs_attr_sf_entry_t *sfe;
xfs_da_args_t nargs;
char *tmpbuffer;
int error, i, size;
xfs_dablk_t blkno;
struct xfs_buf *bp;
xfs_ifork_t *ifp;
trace_xfs_attr_sf_to_leaf(args);
dp = ... | 255,451,512,913,001,000,000,000,000,000,000,000,000 | xfs_attr_leaf.c | 330,567,582,969,333,100,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-13094 | An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. | https://nvd.nist.gov/vuln/detail/CVE-2018-13094 |
3,662 | gpac | bceb03fd2be95097a7b409ea59914f332fb6bc86 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/bceb03fd2be95097a7b409ea59914f332fb6bc86 | fixed 2 possible heap overflows (inc. #1088) | 1 | GF_Err hdlr_dump(GF_Box *a, FILE * trace)
{
GF_HandlerBox *p = (GF_HandlerBox *)a;
gf_isom_box_dump_start(a, "HandlerBox", trace);
if (p->nameUTF8 && (u32) p->nameUTF8[0] == strlen(p->nameUTF8+1)) {
fprintf(trace, "hdlrType=\"%s\" Name=\"%s\" ", gf_4cc_to_str(p->handlerType), p->nameUTF8+1);
} else {
fpri... | 20,155,211,497,845,732,000,000,000,000,000,000,000 | box_dump.c | 2,944,473,506,997,116,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-13006 | An issue was discovered in MP4Box in GPAC 0.7.1. There is a heap-based buffer over-read in the isomedia/box_dump.c function hdlr_dump. | https://nvd.nist.gov/vuln/detail/CVE-2018-13006 |
3,679 | linux | 81f9c4e4177d31ced6f52a89bb70e93bfb77ca03 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/81f9c4e4177d31ced6f52a89bb70e93bfb77ca03 | Merge tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace
Pull tracing fixes from Steven Rostedt:
"This contains a few fixes and a clean up.
- a bad merge caused an "endif" to go in the wrong place in
scripts/Makefile.build
- softirq tracing fix for tracing that cor... | 1 | predicate_parse(const char *str, int nr_parens, int nr_preds,
parse_pred_fn parse_pred, void *data,
struct filter_parse_error *pe)
{
struct prog_entry *prog_stack;
struct prog_entry *prog;
const char *ptr = str;
char *inverts = NULL;
int *op_stack;
int *top;
int invert = 0;
int ret = -ENOMEM;
int len;
int... | 269,743,203,244,690,430,000,000,000,000,000,000,000 | trace_events_filter.c | 236,797,272,490,507,370,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-12714 | An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-... | https://nvd.nist.gov/vuln/detail/CVE-2018-12714 |
3,680 | linux | bd23a7269834dc7c1f93e83535d16ebc44b75eba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd23a7269834dc7c1f93e83535d16ebc44b75eba | virt: vbox: Only copy_from_user the request-header once
In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from
the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the
'version', 'size_in', and 'size_out' fields of 'hdr' are verified.
Before this commit, after the checks a buffe... | 1 | static long vbg_misc_device_ioctl(struct file *filp, unsigned int req,
unsigned long arg)
{
struct vbg_session *session = filp->private_data;
size_t returned_size, size;
struct vbg_ioctl_hdr hdr;
bool is_vmmdev_req;
int ret = 0;
void *buf;
if (copy_from_user(&hdr, (void *)arg, sizeof(hdr)))
return -EFAU... | 3,708,566,526,586,698,000,000,000,000,000,000,000 | vboxguest_linux.c | 280,521,136,845,643,650,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12633 | An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.... | https://nvd.nist.gov/vuln/detail/CVE-2018-12633 |
3,681 | FFmpeg | b3332a182f8ba33a34542e4a0370f38b914ccf7d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d | avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh... | 1 | av_cold void ff_idctdsp_init(IDCTDSPContext *c, AVCodecContext *avctx)
{
const unsigned high_bit_depth = avctx->bits_per_raw_sample > 8;
if (avctx->lowres==1) {
c->idct_put = ff_jref_idct4_put;
c->idct_add = ff_jref_idct4_add;
c->idct = ff_j_rev_dct4;
c->perm_type = FF_ID... | 258,201,715,643,119,100,000,000,000,000,000,000,000 | idctdsp.c | 24,121,040,549,549,385,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12460 | libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12460 |
3,682 | FFmpeg | b3332a182f8ba33a34542e4a0370f38b914ccf7d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d | avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh... | 1 | av_cold void ff_mpv_idct_init(MpegEncContext *s)
{
ff_idctdsp_init(&s->idsp, s->avctx);
/* load & permutate scantables
* note: only wmv uses different ones
*/
if (s->alternate_scan) {
ff_init_scantable(s->idsp.idct_permutation, &s->inter_scantable, ff_alternate_vertical_scan);
... | 214,617,330,672,650,500,000,000,000,000,000,000,000 | mpegvideo.c | 15,848,255,372,654,095,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12460 | libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12460 |
3,683 | FFmpeg | 2fc108f60f98cd00813418a8754a46476b404a3c | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2fc108f60f98cd00813418a8754a46476b404a3c | avcodec/mpeg4videodec: Clear bits_per_raw_sample if it has originated from a previous instance
Fixes: assertion failure
Fixes: ffmpeg_crash_5.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niede... | 1 | int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
unsigned startcode, v;
int ret;
int vol = 0;
/* search next start code */
align_get_bits(gb);
if (s->codec_tag == AV_RL32("WV1F") && show_bits(gb, 24) == 0x575630) {
skip... | 20,215,823,895,074,912,000,000,000,000,000,000,000 | mpeg4videodec.c | 139,065,503,574,081,020,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12459 | An inconsistent bits-per-sample value in the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c in FFmpeg 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-12459 |
3,684 | FFmpeg | e1182fac1afba92a4975917823a5f644bee7e6e8 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e1182fac1afba92a4975917823a5f644bee7e6e8 | avcodec/mpeg4videoenc: Use 64 bit for times in mpeg4_encode_gop_header()
Fixes truncation
Fixes Assertion n <= 31 && value < (1U << n) failed at libavcodec/put_bits.h:169
Fixes: ffmpeg_crash_2.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böhme, Andrew Santosa and Alexandru RazvanCaciulescu with AFLSmart... | 1 | static void mpeg4_encode_gop_header(MpegEncContext *s)
{
int hours, minutes, seconds;
int64_t time;
put_bits(&s->pb, 16, 0);
put_bits(&s->pb, 16, GOP_STARTCODE);
time = s->current_picture_ptr->f->pts;
if (s->reordered_input_picture[1])
time = FFMIN(time, s->reordered_input_picture... | 141,072,668,666,883,980,000,000,000,000,000,000,000 | mpeg4videoenc.c | 245,539,507,026,391,350,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12458 | An improper integer type in the mpeg4_encode_gop_header function in libavcodec/mpeg4videoenc.c in FFmpeg 2.8 and 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-12458 |
3,687 | radare2 | 90b71c017a7fa9732fe45fd21b245ee051b1f548 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548 | Fix #10293 - Use-after-free in r_anal_bb_free() | 1 | R_API void r_anal_bb_free(RAnalBlock *bb) {
if (!bb) {
return;
}
r_anal_cond_free (bb->cond);
R_FREE (bb->fingerprint);
r_anal_diff_free (bb->diff);
bb->diff = NULL;
R_FREE (bb->op_bytes);
r_anal_switch_op_free (bb->switch_op);
bb->switch_op = NULL;
bb->fingerprint = NULL;
bb->cond = NULL;
R_FREE (bb->lab... | 33,807,903,809,090,475,000,000,000,000,000,000,000 | bb.c | 272,606,549,223,286,240,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-12320 | There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12320 |
3,688 | mruby | faa4eaf6803bd11669bc324b4c34e7162286bfa3 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/faa4eaf6803bd11669bc324b4c34e7162286bfa3 | `mrb_class_real()` did not work for `BasicObject`; fix #4037 | 1 | mrb_class_real(struct RClass* cl)
{
if (cl == 0)
return NULL;
while ((cl->tt == MRB_TT_SCLASS) || (cl->tt == MRB_TT_ICLASS)) {
cl = cl->super;
}
return cl;
}
| 120,395,878,351,176,830,000,000,000,000,000,000,000 | class.c | 206,993,897,454,459,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12249 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12249 |
3,689 | mruby | 778500563a9f7ceba996937dc886bd8cde29b42b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b | Extend stack when pushing arguments that does not fit in; fix #4038 | 1 | fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mrb_bool resume, mrb_bool vmexec)
{
struct mrb_context *c = fiber_check(mrb, self);
struct mrb_context *old_c = mrb->c;
mrb_value value;
fiber_check_cfunc(mrb, c);
if (resume && c->status == MRB_FIBER_TRANSFERRED) {
mrb_... | 148,482,836,348,799,490,000,000,000,000,000,000,000 | fiber.c | 104,372,639,444,452,630,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-12248 | An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber. | https://nvd.nist.gov/vuln/detail/CVE-2018-12248 |
3,690 | mruby | 55edae0226409de25e59922807cb09acb45731a2 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/55edae0226409de25e59922807cb09acb45731a2 | Allow `Object#clone` to copy frozen status only; fix #4036
Copying all flags from the original object may overwrite the clone's
flags e.g. the embedded flag. | 1 | mrb_obj_clone(mrb_state *mrb, mrb_value self)
{
struct RObject *p;
mrb_value clone;
if (mrb_immediate_p(self)) {
mrb_raisef(mrb, E_TYPE_ERROR, "can't clone %S", self);
}
if (mrb_type(self) == MRB_TT_SCLASS) {
mrb_raise(mrb, E_TYPE_ERROR, "can't clone singleton class");
}
p = (struct RObject*)mrb_... | 229,363,253,371,945,330,000,000,000,000,000,000,000 | kernel.c | 163,099,176,507,490,390,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12247 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag). | https://nvd.nist.gov/vuln/detail/CVE-2018-12247 |
3,691 | linux | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14 | socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereferenc... | 1 | static int sock_close(struct inode *inode, struct file *filp)
{
sock_release(SOCKET_I(inode));
return 0;
}
| 84,494,788,491,717,655,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12232 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock... | https://nvd.nist.gov/vuln/detail/CVE-2018-12232 |
3,693 | mruby | b64ce17852b180dfeea81cf458660be41a78974d | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b64ce17852b180dfeea81cf458660be41a78974d | Should not call `initialize_copy` for `TT_ICLASS`; fix #4027
Since `TT_ICLASS` is a internal object that should never be revealed
to Ruby world. | 1 | init_copy(mrb_state *mrb, mrb_value dest, mrb_value obj)
{
switch (mrb_type(obj)) {
case MRB_TT_CLASS:
case MRB_TT_MODULE:
copy_class(mrb, dest, obj);
mrb_iv_copy(mrb, dest, obj);
mrb_iv_remove(mrb, dest, mrb_intern_lit(mrb, "__classname__"));
break;
case MRB_TT_OBJECT:
c... | 180,805,267,474,604,700,000,000,000,000,000,000,000 | kernel.c | 284,772,638,438,592,230,000,000,000,000,000,000,000 | [
"CWE-824"
] | CVE-2018-11743 | The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-11743 |
3,696 | Espruino | ce1924193862d58cb43d3d4d9dada710a8361b89 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89 | fix jsvGetString regression | 1 | size_t jsvGetString(const JsVar *v, char *str, size_t len) {
assert(len>0);
const char *s = jsvGetConstString(v);
if (s) {
/* don't use strncpy here because we don't
* want to pad the entire buffer with zeros */
len--;
int l = 0;
while (*s && l<len) {
str[l] = s[l];
l++;
... | 159,195,423,267,930,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-11596 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11596 |
3,699 | Espruino | 8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421) | 1 | JsVar *jswrap_graphics_createArrayBuffer(int width, int height, int bpp, JsVar *options) {
if (width<=0 || height<=0 || width>32767 || height>32767) {
jsExceptionHere(JSET_ERROR, "Invalid Size");
return 0;
}
if (!isValidBPP(bpp)) {
jsExceptionHere(JSET_ERROR, "Invalid BPP");
return 0;
}
JsVar... | 250,096,056,660,193,630,000,000,000,000,000,000,000 | jswrap_graphics.c | 260,225,868,029,461,130,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11592 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11592 |
3,700 | Espruino | b6d362f6a1f2de0b3e7604848116efb509196bf4 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4 | Add sanity check for debug trace print statement (fix #1420) | 1 | void _jsvTrace(JsVar *var, int indent, JsVar *baseVar, int level) {
#ifdef SAVE_ON_FLASH
jsiConsolePrint("Trace unimplemented in this version.\n");
#else
int i;
for (i=0;i<indent;i++) jsiConsolePrint(" ");
if (!var) {
jsiConsolePrint("undefined");
return;
}
jsvTraceLockInfo(var);
int lowestLeve... | 53,958,977,605,870,530,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-11591 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11591 |
3,701 | linux | 0a0b98734479aa5b3c671d5190e86273372cab95 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95 | compat: fix 4-byte infoleak via uninitialized struct field
Commit 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to
native counterparts") removed the memset() in compat_get_timex(). Since
then, the compat adjtimex syscall can invoke do_adjtimex() with an
uninitialized ->tai.
If do_adjtimex() doesn't write... | 1 | int compat_get_timex(struct timex *txc, const struct compat_timex __user *utp)
{
struct compat_timex tx32;
if (copy_from_user(&tx32, utp, sizeof(struct compat_timex)))
return -EFAULT;
txc->modes = tx32.modes;
txc->offset = tx32.offset;
txc->freq = tx32.freq;
txc->maxerror = tx32.maxerror;
txc->esterror... | 24,540,572,475,707,357,000,000,000,000,000,000,000 | compat.c | 17,743,863,291,646,434,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11508 | The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex. | https://nvd.nist.gov/vuln/detail/CVE-2018-11508 |
3,702 | radare2 | 77c47cf873dd55b396da60baa2ca83bbd39e4add | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add | Fix #9903 - oobread in RAnal.sh | 1 | static int sh_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
ut8 op_MSB,op_LSB;
int ret;
if (!data)
return 0;
memset (op, '\0', sizeof (RAnalOp));
op->addr = addr;
op->type = R_ANAL_OP_TYPE_UNK;
op->jump = op->fail = -1;
op->ptr = op->val = -1;
op->size = 2;
op_MSB = anal->big_... | 249,622,554,086,958,550,000,000,000,000,000,000,000 | anal_sh.c | 165,574,273,690,825,930,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11384 | The sh_op() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11384 |
3,703 | radare2 | d04c78773f6959bcb427453f8e5b9824d5ba9eff | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff | Fix #10091 - crash in AVR analysis | 1 | INST_HANDLER (sts) { // STS k, Rr
int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
int k = (buf[3] << 8) | buf[2];
op->ptr = k;
ESIL_A ("r%d,", r);
__generic_ld_st (op, "ram", 0, 1, 0, k, 1);
op->cycles = 2;
}
| 145,404,004,174,958,070,000,000,000,000,000,000,000 | anal_avr.c | 49,931,515,066,285,090,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11382 | The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11382 |
3,704 | radare2 | 3fcf41ed96ffa25b38029449520c8d0a198745f3 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3 | Fix #9902 - Fix oobread in RBin.string_scan_range | 1 | static int string_scan_range(RList *list, RBinFile *bf, int min,
const ut64 from, const ut64 to, int type) {
ut8 tmp[R_STRING_SCAN_BUFFER_SIZE];
ut64 str_start, needle = from;
int count = 0, i, rc, runes;
int str_type = R_STRING_TYPE_DETECT;
if (type == -1) {
type = R_STRING_TYPE_DETECT;
}
if (from >... | 227,698,591,978,418,270,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11381 | The string_scan_range() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11381 |
3,707 | radare2 | 60208765887f5f008b3b9a883f3addc8bdb9c134 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134 | Fix #9970 - heap oobread in mach0 parser (#10026) | 1 | static int parse_import_ptr(struct MACH0_(obj_t)* bin, struct reloc_t *reloc, int idx) {
int i, j, sym, wordsize;
ut32 stype;
wordsize = MACH0_(get_bits)(bin) / 8;
if (idx < 0 || idx >= bin->nsymtab) {
return 0;
}
if ((bin->symtab[idx].n_desc & REFERENCE_TYPE) == REFERENCE_FLAG_UNDEFINED_LAZY) {
stype = S_LAZ... | 318,868,786,944,603,400,000,000,000,000,000,000,000 | mach0.c | 163,775,332,068,251,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11380 | The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted Mach-O file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11380 |
3,708 | radare2 | 4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | Fix crash in pe | 1 | static int get_debug_info(struct PE_(r_bin_pe_obj_t)* bin, PE_(image_debug_directory_entry)* dbg_dir_entry, ut8* dbg_data, int dbg_data_len, SDebugInfo* res) {
#define SIZEOF_FILE_NAME 255
int i = 0;
const char* basename;
if (!dbg_data) {
return 0;
}
switch (dbg_dir_entry->Type) {
case IMAGE_DEBUG_TYPE_CODEVI... | 38,287,125,071,570,595,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11379 | The get_debug_info() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted PE file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11379 |
3,710 | radare2 | 25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | Fix invalid free in RAnal.avr | 1 | INST_HANDLER (sbrx) { // SBRC Rr, b
int b = buf[0] & 0x7;
int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x01) << 4);
RAnalOp next_op;
avr_op_analyze (anal,
&next_op,
op->addr + op->size, buf + op->size, len - op->size,
cpu);
r_strbuf_fini (&next_op.esil);
op->jump = op->addr + next_op.size + 2;
op->cy... | 117,498,818,528,294,220,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11377 | The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11377 |
3,713 | radare2 | 041e53cab7ca33481ae45ecd65ad596976d78e68 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68 | Fix crash in anal.avr | 1 | INST_HANDLER (lds) { // LDS Rd, k
int d = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
int k = (buf[3] << 8) | buf[2];
op->ptr = k;
__generic_ld_st (op, "ram", 0, 1, 0, k, 0);
ESIL_A ("r%d,=,", d);
}
| 293,018,390,461,922,750,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11375 | The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11375 |
3,714 | linux | f09444639099584bc4784dfcd85ada67c6f33e0f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f09444639099584bc4784dfcd85ada67c6f33e0f | coresight: fix kernel panic caused by invalid CPU
Commit d52c9750f150 ("coresight: reset "enable_sink" flag when need be")
caused a kernel panic because of the using of an invalid value: after
'for_each_cpu(cpu, mask)', value of local variable 'cpu' become invalid,
causes following 'cpu_to_node' access invalid memory ... | 1 | static void *etm_setup_aux(int event_cpu, void **pages,
int nr_pages, bool overwrite)
{
int cpu;
cpumask_t *mask;
struct coresight_device *sink;
struct etm_event_data *event_data = NULL;
event_data = alloc_event_data(event_cpu);
if (!event_data)
return NULL;
/*
* In theory nothing prevent tracers in ... | 116,152,585,108,812,740,000,000,000,000,000,000,000 | coresight-etm-perf.c | 265,668,461,210,710,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-11232 | The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable. | https://nvd.nist.gov/vuln/detail/CVE-2018-11232 |
3,715 | linux | 9de4ee40547fd315d4a0ed1dd15a2fa3559ad707 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707 | cdrom: information leak in cdrom_ioctl_media_changed()
This cast is wrong. "cdi->capacity" is an int and "arg" is an unsigned
long. The way the check is written now, if one of the high 32 bits is
set then we could read outside the info->slots[] array.
This bug is pretty old and it predates git.
Reviewed-by: Christ... | 1 | static int cdrom_ioctl_media_changed(struct cdrom_device_info *cdi,
unsigned long arg)
{
struct cdrom_changer_info *info;
int ret;
cd_dbg(CD_DO_IOCTL, "entering CDROM_MEDIA_CHANGED\n");
if (!CDROM_CAN(CDC_MEDIA_CHANGED))
return -ENOSYS;
/* cannot select disc or select current disc */
if (!CDROM_CAN(CDC_SE... | 336,721,753,792,307,100,000,000,000,000,000,000,000 | cdrom.c | 93,333,265,289,730,710,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10940 | The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory. | https://nvd.nist.gov/vuln/detail/CVE-2018-10940 |
3,716 | libgit2 | 9844d38bed10e9ff17174434b3421b227ae710f3 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3 | delta: fix out-of-bounds read of delta
When computing the offset and length of the delta base, we repeatedly
increment the `delta` pointer without checking whether we have advanced
past its end already, which can thus result in an out-of-bounds read.
Fix this by repeatedly checking whether we have reached the end. Add... | 1 | int git_delta_apply(
void **out,
size_t *out_len,
const unsigned char *base,
size_t base_len,
const unsigned char *delta,
size_t delta_len)
{
const unsigned char *delta_end = delta + delta_len;
size_t base_sz, res_sz, alloc_sz;
unsigned char *res_dp;
*out = NULL;
*out_len = 0;
/*
* Check that the base s... | 129,712,746,807,172,540,000,000,000,000,000,000,000 | delta.c | 58,338,496,957,847,360,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10888 | A flaw was found in libgit2 before version 0.27.3. A missing check in git_delta_apply function in delta.c file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service. | https://nvd.nist.gov/vuln/detail/CVE-2018-10888 |
3,717 | libgit2 | c1577110467b701dcbcf9439ac225ea851b47d22 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22 | delta: fix overflow when computing limit
When checking whether a delta base offset and length fit into the base
we have in memory already, we can trigger an overflow which breaks the
check. This would subsequently result in us reading memory from out of
bounds of the base.
The issue is easily fixed by checking for ov... | 1 | int git_delta_apply(
void **out,
size_t *out_len,
const unsigned char *base,
size_t base_len,
const unsigned char *delta,
size_t delta_len)
{
const unsigned char *delta_end = delta + delta_len;
size_t base_sz, res_sz, alloc_sz;
unsigned char *res_dp;
*out = NULL;
*out_len = 0;
/*
* Check that the base s... | 228,984,589,945,149,840,000,000,000,000,000,000,000 | delta.c | 235,241,610,924,393,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10887 | A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addre... | https://nvd.nist.gov/vuln/detail/CVE-2018-10887 |
3,718 | ngiflib | cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | https://github.com/miniupnp/ngiflib | https://github.com/miniupnp/ngiflib/commit/cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | fix "pixel overrun"
fixes #3 | 1 | static int DecodeGifImg(struct ngiflib_img * i) {
struct ngiflib_decode_context context;
long npix;
u8 * stackp;
u8 * stack_top;
u16 clr;
u16 eof;
u16 free;
u16 act_code = 0;
u16 old_code = 0;
u16 read_byt;
u16 ab_prfx[4096];
u8 ab_suffx[4096];
u8 ab_stack[4096];
u8 flags;
u8 casspecial = 0;
if(!i) ret... | 208,688,875,586,295,620,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-10717 | The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 does not consider the bounds of the pixels data structure, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file, a differen... | https://nvd.nist.gov/vuln/detail/CVE-2018-10717 |
3,719 | ngiflib | b588a2249c7abbfc52173e32ee11d6facef82f89 | https://github.com/miniupnp/ngiflib | https://github.com/miniupnp/ngiflib/commit/b588a2249c7abbfc52173e32ee11d6facef82f89 | check GIF image position and dimensions
fixes #1 | 1 | static int DecodeGifImg(struct ngiflib_img * i) {
struct ngiflib_decode_context context;
long npix;
u8 * stackp;
u8 * stack_top;
u16 clr;
u16 eof;
u16 free;
u16 act_code = 0;
u16 old_code = 0;
u16 read_byt;
u16 ab_prfx[4096];
u8 ab_suffx[4096];
u8 ab_stack[4096];
u8 flags;
u8 casspecial = 0;
if(!i) ret... | 284,105,126,342,844,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-10677 | The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 lacks certain checks against width and height, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-10677 |
3,720 | linux | 73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | mm/mempolicy: fix use after free when calling get_mempolicy
I hit a use after free issue when executing trinity and repoduced it
with KASAN enabled. The related call trace is as follows.
BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766
Read of size 2 by task syz-executor1/798
... | 1 | static long do_get_mempolicy(int *policy, nodemask_t *nmask,
unsigned long addr, unsigned long flags)
{
int err;
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma = NULL;
struct mempolicy *pol = current->mempolicy;
if (flags &
~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED))
... | 152,269,556,434,917,930,000,000,000,000,000,000,000 | mempolicy.c | 25,852,424,809,621,314,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-10675 | The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2018-10675 |
3,721 | file | a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | https://github.com/file/file | https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | Avoid reading past the end of buffer (Rui Reis) | 1 | do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap, uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags, size_t size, int clazz)
{
#ifdef ELFCORE
int os_style = -1;
/*
* Sigh. The 2.0.36 kernel in Debian 2.1, at
* least, doesn't correctly implement name
*... | 272,730,783,674,373,480,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10360 | The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-10360 |
3,722 | mruby | b51b21fc63c9805862322551387d9036f2b63433 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Fix `use after free in File#initilialize_copy`; fix #4001
The bug and the fix were reported by https://hackerone.com/pnoltof | 1 | mrb_io_initialize_copy(mrb_state *mrb, mrb_value copy)
{
mrb_value orig;
mrb_value buf;
struct mrb_io *fptr_copy;
struct mrb_io *fptr_orig;
mrb_bool failed = TRUE;
mrb_get_args(mrb, "o", &orig);
fptr_copy = (struct mrb_io *)DATA_PTR(copy);
if (fptr_copy != NULL) {
fptr_finalize(mrb, fptr_copy... | 150,634,863,447,224,430,000,000,000,000,000,000,000 | io.c | 41,201,053,483,208,995,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-10199 | In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2018-10199 |
3,723 | mruby | 1905091634a6a2925c911484434448e568330626 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/1905091634a6a2925c911484434448e568330626 | Check length of env stack before accessing upvar; fix #3995 | 1 | mrb_vm_exec(mrb_state *mrb, struct RProc *proc, mrb_code *pc)
{
/* mrb_assert(mrb_proc_cfunc_p(proc)) */
mrb_irep *irep = proc->body.irep;
mrb_value *pool = irep->pool;
mrb_sym *syms = irep->syms;
mrb_code i;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jmp = mrb->jmp;
struct mrb_jmpbuf c_jm... | 140,181,947,558,548,590,000,000,000,000,000,000,000 | vm.c | 252,079,256,979,517,780,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-10191 | In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2018-10191 |
3,724 | linux | 4ea77014af0d6205b05503d1c7aac6eace11d473 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473 | kernel/signal.c: avoid undefined behaviour in kill_something_info
When running kill(72057458746458112, 0) in userspace I hit the following
issue.
UBSAN: Undefined behaviour in kernel/signal.c:1462:11
negation of -2147483648 cannot be represented in type 'int':
CPU: 226 PID: 9849 Comm: test Tainted: G B ... | 1 | static int kill_something_info(int sig, struct siginfo *info, pid_t pid)
{
int ret;
if (pid > 0) {
rcu_read_lock();
ret = kill_pid_info(sig, info, find_vpid(pid));
rcu_read_unlock();
return ret;
}
read_lock(&tasklist_lock);
if (pid != -1) {
ret = __kill_pgrp_info(sig, info,
pid ? find_vpid(-p... | 233,236,629,790,152,600,000,000,000,000,000,000,000 | signal.c | 43,790,563,659,993,175,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10124 | The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument. | https://nvd.nist.gov/vuln/detail/CVE-2018-10124 |
3,725 | linux | 9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe()
platform_get_resource() may return NULL, add proper check to
avoid potential NULL dereferencing.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, e1, e2;
@@
res = platform_get_resource(pdev, t, n);
+ if ... | 1 | static int hi3660_stub_clk_probe(struct platform_device *pdev)
{
struct device *dev = &pdev->dev;
struct resource *res;
unsigned int i;
int ret;
/* Use mailbox client without blocking */
stub_clk_chan.cl.dev = dev;
stub_clk_chan.cl.tx_done = NULL;
stub_clk_chan.cl.tx_block = false;
stub_clk_chan.cl.knows_txdo... | 198,852,483,878,198,200,000,000,000,000,000,000,000 | clk-hi3660-stub.c | 154,652,412,877,365,080,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-10074 | The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval. | https://nvd.nist.gov/vuln/detail/CVE-2018-10074 |
3,729 | mbedtls | 740b218386083dc708ce98ccc94a63a95cd5629e | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/740b218386083dc708ce98ccc94a63a95cd5629e | Add bounds check before length read | 1 | static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl,
unsigned char **p,
unsigned char *end )
{
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
size_t len;
((void) ssl);
/*
* PSK parameters:
*
* opaqu... | 249,660,299,586,144,350,000,000,000,000,000,000,000 | ssl_cli.c | 312,635,158,393,935,170,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-9989 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9989 |
3,730 | mbedtls | a1098f81c252b317ad34ea978aea2bc47760b215 | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/a1098f81c252b317ad34ea978aea2bc47760b215 | Add bounds check before signature length read | 1 | static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl )
{
int ret;
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
ssl->transform_negotiate->ciphersuite_info;
unsigned char *p = NULL, *end = NULL;
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
#if defined(MBED... | 126,675,777,471,818,340,000,000,000,000,000,000,000 | ssl_cli.c | 245,686,137,588,342,770,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-9988 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9988 |
3,731 | openvpn | 1394192b210cb3c6624a7419bcf3ff966742e79b | https://github.com/OpenVPN/openvpn | https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b | Fix potential double-free() in Interactive Service (CVE-2018-9336)
Malformed input data on the service pipe towards the OpenVPN interactive
service (normally used by the OpenVPN GUI to request openvpn instances
from the service) can result in a double free() in the error handling code.
This usually only leads to a pr... | 1 | GetStartupData(HANDLE pipe, STARTUP_DATA *sud)
{
size_t size, len;
BOOL ret = FALSE;
WCHAR *data = NULL;
DWORD bytes, read;
bytes = PeekNamedPipeAsync(pipe, 1, &exit_event);
if (bytes == 0)
{
MsgToEventLog(M_SYSERR, TEXT("PeekNamedPipeAsync failed"));
ReturnLastErro... | 292,015,260,812,614,400,000,000,000,000,000,000,000 | interactive.c | 297,968,443,524,703,830,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-9336 | openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privil... | https://nvd.nist.gov/vuln/detail/CVE-2018-9336 |
3,732 | yubico-pam | 0f6ceabab0a8849b47f67d727aa526c2656089ba | https://github.com/Yubico/yubico-pam | https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba | util: make sure to close the authfile before returning success
fixes #136 | 1 | check_user_token (const char *authfile,
const char *username,
const char *otp_id,
int verbose,
FILE *debug_file)
{
char buf[1024];
char *s_user, *s_token;
int retval = AUTH_ERROR;
int fd;
struct stat st;
FILE *opwfile;
fd = open(authfile, O_RDONLY, 0);
if (fd < 0) {
... | 73,976,873,416,705,270,000,000,000,000,000,000,000 | util.c | 194,446,551,470,215,400,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-9275 | In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors). | https://nvd.nist.gov/vuln/detail/CVE-2018-9275 |
3,733 | openbsd | 0654414afcce51a16d35d05060190a3ec4618d42 | https://github.com/libressl-portable/openbsd | https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42 | None | 1 | int_x509_param_set_hosts(X509_VERIFY_PARAM_ID *id, int mode,
const char *name, size_t namelen)
{
char *copy;
/*
* Refuse names with embedded NUL bytes.
* XXX: Do we need to push an error onto the error stack?
*/
if (name && memchr(name, '\0', namelen))
return 0;
if (mode == SET_HOST && id->hosts... | 281,204,162,380,877,240,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2018-8970 | The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive informatio... | https://nvd.nist.gov/vuln/detail/CVE-2018-8970 |
3,734 | linux | d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | x86/entry/64: Don't use IST entry for #BP stack
There's nothing IST-worthy about #BP/int3. We don't allow kprobes
in the small handful of places in the kernel that run at CPL0 with
an invalid stack, and 32-bit kernels have used normal interrupt
gates for #BP forever.
Furthermore, we don't allow kprobes in places tha... | 1 | dotraplinkage void notrace do_int3(struct pt_regs *regs, long error_code)
{
#ifdef CONFIG_DYNAMIC_FTRACE
/*
* ftrace must be first, everything else may cause a recursive crash.
* See note by declaration of modifying_ftrace_code in ftrace.c
*/
if (unlikely(atomic_read(&modifying_ftrace_code)) &&
ftrace_i... | 106,804,786,307,522,770,000,000,000,000,000,000,000 | traps.c | 166,654,386,209,643,410,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-8897 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) pri... | https://nvd.nist.gov/vuln/detail/CVE-2018-8897 |
3,735 | kamailio | e1d8008a09d9390ebaf698abe8909e10dfec4097 | https://github.com/kamailio/kamailio | https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097 | tmx: allocate space to store ending 0 for branch value
- reported by Alfred Farrugia and Sandro Gauci | 1 | int tmx_check_pretran(sip_msg_t *msg)
{
unsigned int chid;
unsigned int slotid;
int dsize;
struct via_param *vbr;
str scallid;
str scseqmet;
str scseqnum;
str sftag;
str svbranch = {NULL, 0};
pretran_t *it;
if(_tmx_ptran_table==NULL) {
LM_ERR("pretran hash table not initialized yet\n");
return -1;
}
i... | 133,412,845,150,430,060,000,000,000,000,000,000,000 | tmx_pretran.c | 50,705,933,634,594,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8828 | A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x before 5.0.6, and 5.1.x before 5.1.2. A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_pretran function in modules/tmx/tmx_pretran.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-8828 |
3,746 | FreeRDP | d1112c279bd1a327e8e4d0b5f371458bf2579659 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659 | Fixed CVE-2018-8788
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | static void nsc_rle_decode(BYTE* in, BYTE* out, UINT32 originalSize)
{
UINT32 len;
UINT32 left;
BYTE value;
left = originalSize;
while (left > 4)
{
value = *in++;
if (left == 5)
{
*out++ = value;
left--;
}
else if (value == *in)
{
in++;
if (*in < 0xFF)
{
len = (UINT32) *... | 6,048,075,215,570,503,000,000,000,000,000,000,000 | nsc.c | 220,797,472,776,409,930,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-8788 | FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8788 |
3,752 | FreeRDP | 09b9d4f1994a674c4ec85b4947aa656eda1aed8a | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a | Fixed CVE-2018-8787
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | static BOOL gdi_Bitmap_Decompress(rdpContext* context, rdpBitmap* bitmap,
const BYTE* pSrcData, UINT32 DstWidth, UINT32 DstHeight,
UINT32 bpp, UINT32 length, BOOL compressed,
UINT32 codecId)
{
UINT32 SrcSize = lengt... | 8,582,638,630,962,748,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-8787 | FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8787 |
3,753 | FreeRDP | 445a5a42c500ceb80f8fa7f2c11f3682538033f3 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3 | Fixed CVE-2018-8786
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | BITMAP_UPDATE* update_read_bitmap_update(rdpUpdate* update, wStream* s)
{
UINT32 i;
BITMAP_UPDATE* bitmapUpdate = calloc(1, sizeof(BITMAP_UPDATE));
if (!bitmapUpdate)
goto fail;
if (Stream_GetRemainingLength(s) < 2)
goto fail;
Stream_Read_UINT16(s, bitmapUpdate->number); /* numberRectangles (2 bytes) */
WL... | 282,936,062,818,017,570,000,000,000,000,000,000,000 | update.c | 243,677,407,853,847,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8786 | FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8786 |
3,754 | FreeRDP | 602f4a2e14b41703b5f431de3154cd46a5750a2d | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d | Fixed CVE-2018-8785
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | int zgfx_decompress(ZGFX_CONTEXT* zgfx, const BYTE* pSrcData, UINT32 SrcSize, BYTE** ppDstData,
UINT32* pDstSize, UINT32 flags)
{
int status = -1;
BYTE descriptor;
wStream* stream = Stream_New((BYTE*)pSrcData, SrcSize);
if (!stream)
return -1;
if (Stream_GetRemainingLength(stream) < 1... | 318,980,867,436,274,160,000,000,000,000,000,000,000 | zgfx.c | 283,567,047,878,855,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8785 | FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8785 |
3,757 | FreeRDP | 17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | Fixed CVE-2018-8784
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | static BOOL zgfx_decompress_segment(ZGFX_CONTEXT* zgfx, wStream* stream, size_t segmentSize)
{
BYTE c;
BYTE flags;
UINT32 extra = 0;
int opIndex;
int haveBits;
int inPrefix;
UINT32 count;
UINT32 distance;
BYTE* pbSegment;
size_t cbSegment = segmentSize - 1;
if ((Stream_GetRemainingLength(stream) < segme... | 48,551,217,187,937,530,000,000,000,000,000,000,000 | zgfx.c | 146,200,484,448,513,670,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8784 | FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8784 |
3,759 | libgit2 | 3207ddb0103543da8ad2139ec6539f590f9900c1 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/3207ddb0103543da8ad2139ec6539f590f9900c1 | index: fix out-of-bounds read with invalid index entry prefix length
The index format in version 4 has prefix-compressed entries, where every
index entry can compress its path by using a path prefix of the previous
entry. Since implmenting support for this index format version in commit
5625d86b9 (index: support index... | 1 | static int read_entry(
git_index_entry **out,
size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBE... | 197,322,156,807,941,720,000,000,000,000,000,000,000 | index.c | 3,627,655,496,182,682,700,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-8098 | Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8098 |
3,760 | linux | 0ddcff49b672239dda94d70d0fcf50317a9f4b51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0ddcff49b672239dda94d70d0fcf50317a9f4b51 | mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
'hwname' is malloced in hwsim_new_radio_nl() and should be freed
before leaving from the error handling cases, otherwise it will cause
memory leak.
Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length")
Signed-off-by: Wei Yongjun <we... | 1 | static int hwsim_new_radio_nl(struct sk_buff *msg, struct genl_info *info)
{
struct hwsim_new_radio_params param = { 0 };
const char *hwname = NULL;
int ret;
param.reg_strict = info->attrs[HWSIM_ATTR_REG_STRICT_REG];
param.p2p_device = info->attrs[HWSIM_ATTR_SUPPORT_P2P_DEVICE];
param.channels = channels;
param... | 260,520,256,202,264,520,000,000,000,000,000,000,000 | mac80211_hwsim.c | 75,874,823,711,895,600,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-8087 | Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case. | https://nvd.nist.gov/vuln/detail/CVE-2018-8087 |
3,761 | linux | 297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()
platform_get_resource() may fail and return NULL, so we should
better check it's return value to avoid a NULL pointer dereference
a bit later in the code.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, ... | 1 | static int unimac_mdio_probe(struct platform_device *pdev)
{
struct unimac_mdio_pdata *pdata = pdev->dev.platform_data;
struct unimac_mdio_priv *priv;
struct device_node *np;
struct mii_bus *bus;
struct resource *r;
int ret;
np = pdev->dev.of_node;
priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL);
... | 265,342,746,482,685,360,000,000,000,000,000,000,000 | mdio-bcm-unimac.c | 301,959,438,202,686,220,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-8043 | The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2018-8043 |
3,762 | libvips | 20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | https://github.com/libvips/libvips | https://github.com/jcupitt/libvips/commit/20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | fix a crash with delayed load
If a delayed load failed, it could leave the pipeline only half-set up.
Sebsequent threads could then segv.
Set a load-has-failed flag and test before generate.
See https://github.com/jcupitt/libvips/issues/893 | 1 | vips_foreign_load_start( VipsImage *out, void *a, void *b )
{
VipsForeignLoad *load = VIPS_FOREIGN_LOAD( b );
VipsForeignLoadClass *class = VIPS_FOREIGN_LOAD_GET_CLASS( load );
if( !load->real ) {
if( !(load->real = vips_foreign_load_temp( load )) )
return( NULL );
#ifdef DEBUG
printf( "vips_foreign_l... | 279,924,439,095,021,870,000,000,000,000,000,000,000 | foreign.c | 110,778,714,136,646,050,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-7998 | In libvips before 8.6.3, a NULL function pointer dereference vulnerability was found in the vips_region_generate function in region.c, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted image file. This occurs because of a race condition involving a failed... | https://nvd.nist.gov/vuln/detail/CVE-2018-7998 |
3,763 | linux | 4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | scsi: libsas: fix memory leak in sas_smp_get_phy_events()
We've got a memory leak with the following producer:
while true;
do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null;
done
The buffer req is allocated and not freed after we return. Fix it.
Fixes: 2908d778ab3e ("[SCSI] aic94xx: new driver")
S... | 1 | int sas_smp_get_phy_events(struct sas_phy *phy)
{
int res;
u8 *req;
u8 *resp;
struct sas_rphy *rphy = dev_to_rphy(phy->dev.parent);
struct domain_device *dev = sas_find_dev_by_rphy(rphy);
req = alloc_smp_req(RPEL_REQ_SIZE);
if (!req)
return -ENOMEM;
resp = alloc_smp_resp(RPEL_RESP_SIZE);
if (!resp) {
kfr... | 239,534,202,847,056,830,000,000,000,000,000,000,000 | sas_expander.c | 20,389,702,074,033,690,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-7757 | Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/inval... | https://nvd.nist.gov/vuln/detail/CVE-2018-7757 |
3,764 | openjpeg | 6d8c0c06ee32dc03ba80acd48334e98728e56cf5 | https://github.com/uclouvain/openjpeg | https://github.com/kbabioch/openjpeg/commit/6d8c0c06ee32dc03ba80acd48334e98728e56cf5 | None | 1 | int main(int argc, char *argv[])
{
opj_dinfo_t* dinfo;
opj_event_mgr_t event_mgr; /* event manager */
int tnum;
unsigned int snum;
opj_mj2_t *movie;
mj2_tk_t *track;
mj2_sample_t *sample;
unsigned char* frame_codestream;
FILE *file, *outfile;
char outfilename[50];
mj2_dp... | 271,909,071,981,036,530,000,000,000,000,000,000,000 | opj_mj2_extract.c | 253,856,647,793,899,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7648 | An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line. | https://nvd.nist.gov/vuln/detail/CVE-2018-7648 |
3,765 | linux | f3069c6d33f6ae63a1668737bc78aaaa51bff7ca | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f3069c6d33f6ae63a1668737bc78aaaa51bff7ca | rds: Fix NULL pointer dereference in __rds_rdma_map
This is a fix for syzkaller719569, where memory registration was
attempted without any underlying transport being loaded.
Analysis of the case reveals that it is the setsockopt() RDS_GET_MR
(2) and RDS_GET_MR_FOR_DEST (7) that are vulnerable.
Here is an example sta... | 1 | static int __rds_rdma_map(struct rds_sock *rs, struct rds_get_mr_args *args,
u64 *cookie_ret, struct rds_mr **mr_ret)
{
struct rds_mr *mr = NULL, *found;
unsigned int nr_pages;
struct page **pages = NULL;
struct scatterlist *sg;
void *trans_private;
unsigned long flags;
rds_rdma_cookie_t cookie;
unsigned in... | 227,718,939,197,316,780,000,000,000,000,000,000,000 | rdma.c | 290,702,579,713,901,130,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7492 | A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST. | https://nvd.nist.gov/vuln/detail/CVE-2018-7492 |
3,772 | unixODBC | 45ef78e037f578b15fc58938a3a3251655e71d6f | https://github.com/lurcher/unixODBC | https://github.com/lurcher/unixODBC/commit/45ef78e037f578b15fc58938a3a3251655e71d6f#diff-d52750c7ba4e594410438569d8e2963aL24 | New Pre Source | 1 | BOOL SQLWriteFileDSN( LPCSTR pszFileName,
LPCSTR pszAppName,
LPCSTR pszKeyName,
LPCSTR pszString )
{
HINI hIni;
char szFileName[ODBC_FILENAME_MAX+1];
if ( pszFileName[0] == '/' )
{
strncpy( szFileName, sizeof(szFileName) - 5, pszFileName );
}
else
{
char szPath[ODBC_FILENAME... | 179,664,217,812,201,060,000,000,000,000,000,000,000 | SQLWriteFileDSN.c | 157,150,626,156,817,090,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7485 | The SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c in unixODBC 2.3.5 has strncpy arguments in the wrong order, which allows attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-7485 |
3,773 | linux | 9b54d816e00425c3a517514e0d677bb3cec49258 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9b54d816e00425c3a517514e0d677bb3cec49258 | blkcg: fix double free of new_blkg in blkcg_init_queue
If blkg_create fails, new_blkg passed as an argument will
be freed by blkg_create, so there is no need to free it again.
Signed-off-by: Hou Tao <houtao1@huawei.com>
Signed-off-by: Jens Axboe <axboe@fb.com> | 1 | int blkcg_init_queue(struct request_queue *q)
{
struct blkcg_gq *new_blkg, *blkg;
bool preloaded;
int ret;
new_blkg = blkg_alloc(&blkcg_root, q, GFP_KERNEL);
if (!new_blkg)
return -ENOMEM;
preloaded = !radix_tree_preload(GFP_KERNEL);
/*
* Make sure the root blkg exists and count the existing blkgs. As
... | 94,022,243,707,851,460,000,000,000,000,000,000,000 | blk-cgroup.c | 11,694,601,837,132,450,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-7480 | The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-7480 |
3,774 | leptonica | c1079bb8e77cdd426759e466729917ca37a3ed9f | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f | prog/htmlviewer: Catch unbound memory access (CID 1386222)
rootname can have any size, so limit the amount of copied bytes.
Signed-off-by: Stefan Weil <sw@weilnetz.de> | 1 | pixHtmlViewer(const char *dirin,
const char *dirout,
const char *rootname,
l_int32 thumbwidth,
l_int32 viewwidth)
{
char *fname, *fullname, *outname;
char *mainname, *linkname, *linknameshort;
char *viewfile, *thumbfile;
char *shtm... | 91,775,814,159,057,430,000,000,000,000,000,000,000 | htmlviewer.c | 175,672,854,193,627,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7247 | An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-7247 |
3,779 | leptonica | ee301cb2029db8a6289c5295daa42bba7715e99a | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Security fixes: expect final changes for release 1.75.3.
* Fixed a debian security issue with fscanf() reading a string with
possible buffer overflow.
* There were also a few similar situations with sscanf(). | 1 | gplotRead(const char *filename)
{
char buf[L_BUF_SIZE];
char *rootname, *title, *xlabel, *ylabel, *ignores;
l_int32 outformat, ret, version, ignore;
FILE *fp;
GPLOT *gplot;
PROCNAME("gplotRead");
if (!filename)
return (GPLOT *)ERROR_PTR("filename not defined", procName, NULL);
... | 92,835,320,699,013,360,000,000,000,000,000,000,000 | gplot.c | 223,723,602,336,187,550,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7186 | Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. | https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
3,780 | leptonica | ee301cb2029db8a6289c5295daa42bba7715e99a | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Security fixes: expect final changes for release 1.75.3.
* Fixed a debian security issue with fscanf() reading a string with
possible buffer overflow.
* There were also a few similar situations with sscanf(). | 1 | ptaReadStream(FILE *fp)
{
char typestr[128];
l_int32 i, n, ix, iy, type, version;
l_float32 x, y;
PTA *pta;
PROCNAME("ptaReadStream");
if (!fp)
return (PTA *)ERROR_PTR("stream not defined", procName, NULL);
if (fscanf(fp, "\n Pta Version %d\n", &version) != 1)
retur... | 30,001,997,675,172,210,000,000,000,000,000,000,000 | ptabasic.c | 4,753,893,045,332,788,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7186 | Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. | https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
3,783 | linux | fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a | futex: Prevent overflow by strengthen input validation
UBSAN reports signed integer overflow in kernel/futex.c:
UBSAN: Undefined behaviour in kernel/futex.c:2041:18
signed integer overflow:
0 - -2147483648 cannot be represented in type 'int'
Add a sanity check to catch negative values of nr_wake and nr_requeue.
... | 1 | static int futex_requeue(u32 __user *uaddr1, unsigned int flags,
u32 __user *uaddr2, int nr_wake, int nr_requeue,
u32 *cmpval, int requeue_pi)
{
union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT;
int drop_count = 0, task_count = 0, ret;
struct futex_pi_state *pi_state = NULL;
struct futex_hash_bu... | 199,927,163,848,810,380,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-6927 | The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value. | https://nvd.nist.gov/vuln/detail/CVE-2018-6927 |
3,784 | suricata | e1ef57c848bbe4e567d5d4b66d346a742e3f77a1 | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1 | stream: still inspect packets dropped by stream
The detect engine would bypass packets that are set as dropped. This
seems sane, as these packets are going to be dropped anyway.
However, it lead to the following corner case: stream events that
triggered the drop could not be matched on the rules. The packet
with the ... | 1 | static void DetectFlow(ThreadVars *tv,
DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
Packet *p)
{
/* No need to perform any detection on this packet, if the the given flag is set.*/
if ((p->flags & PKT_NOPACKET_INSPECTION) ||
(PACKET_TEST_ACTIO... | 195,957,054,812,264,830,000,000,000,000,000,000,000 | detect.c | 153,350,231,578,102,060,000,000,000,000,000,000,000 | [
"CWE-693"
] | CVE-2018-6794 | Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utili... | https://nvd.nist.gov/vuln/detail/CVE-2018-6794 |
3,785 | suricata | e1ef57c848bbe4e567d5d4b66d346a742e3f77a1 | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1 | stream: still inspect packets dropped by stream
The detect engine would bypass packets that are set as dropped. This
seems sane, as these packets are going to be dropped anyway.
However, it lead to the following corner case: stream events that
triggered the drop could not be matched on the rules. The packet
with the ... | 1 | int StreamTcpPacket (ThreadVars *tv, Packet *p, StreamTcpThread *stt,
PacketQueue *pq)
{
SCEnter();
DEBUG_ASSERT_FLOW_LOCKED(p->flow);
SCLogDebug("p->pcap_cnt %"PRIu64, p->pcap_cnt);
/* assign the thread id to the flow */
if (unlikely(p->flow->thread_id == 0)) {
p->fl... | 197,454,659,043,875,700,000,000,000,000,000,000,000 | stream-tcp.c | 1,301,724,529,142,096,000,000,000,000,000,000,000 | [
"CWE-693"
] | CVE-2018-6794 | Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utili... | https://nvd.nist.gov/vuln/detail/CVE-2018-6794 |
3,786 | WavPack | d5bf76b5a88d044a1be1d5656698e3ba737167e5 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5 | issue #27, do not overwrite stack on corrupt RF64 file | 1 | int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0;
int64_t total_samples = 0, infilesize;
RiffChunkHeader riff_chunk_header;
ChunkHeader chunk_header;
WaveHeader WaveHeader;
... | 266,946,299,595,107,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-6767 | A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file. | https://nvd.nist.gov/vuln/detail/CVE-2018-6767 |
3,787 | uncurl | 448cd13e7b18c83855d706c564341ddd1e38e769 | https://github.com/chrisd1100/uncurl | https://github.com/chrisd1100/uncurl/commit/448cd13e7b18c83855d706c564341ddd1e38e769 | None | 1 | UNCURL_EXPORT int32_t uncurl_ws_accept(struct uncurl_conn *ucc, char **origins, int32_t n_origins)
{
int32_t e;
e = uncurl_read_header(ucc);
if (e != UNCURL_OK) return e;
uncurl_set_header_str(ucc, "Upgrade", "websocket");
uncurl_set_header_str(ucc, "Connection", "Upgrade");
char *origin = NULL;
e = uncurl_g... | 185,832,743,048,029,200,000,000,000,000,000,000,000 | None | null | [
"CWE-352"
] | CVE-2018-6651 | In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim... | https://nvd.nist.gov/vuln/detail/CVE-2018-6651 |
3,790 | w3m | 7fdc83b0364005a0b5ed869230dd81752ba022e8 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8 | Prevent invalid columnPos() call in formUpdateBuffer()
Bug-Debian: https://github.com/tats/w3m/issues/89 | 1 | formUpdateBuffer(Anchor *a, Buffer *buf, FormItemList *form)
{
Buffer save;
char *p;
int spos, epos, rows, c_rows, pos, col = 0;
Line *l;
copyBuffer(&save, buf);
gotoLine(buf, a->start.line);
switch (form->type) {
case FORM_TEXTAREA:
case FORM_INPUT_TEXT:
case FORM_INPUT_FILE:
... | 90,699,627,261,407,880,000,000,000,000,000,000,000 | form.c | 290,331,077,565,996,070,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-6197 | w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-6197 |
3,791 | w3m | 8354763b90490d4105695df52674d0fcef823e92 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/8354763b90490d4105695df52674d0fcef823e92 | Prevent negative indent value in feed_table_block_tag()
Bug-Debian: https://github.com/tats/w3m/issues/88 | 1 | feed_table_block_tag(struct table *tbl,
char *line, struct table_mode *mode, int indent, int cmd)
{
int offset;
if (mode->indent_level <= 0 && indent == -1)
return;
if (mode->indent_level >= CHAR_MAX && indent == 1)
return;
setwidth(tbl, mode);
feed_table_inline_tag(tbl, line, mode, -1);
... | 95,430,748,719,998,940,000,000,000,000,000,000,000 | table.c | 48,265,608,758,374,150,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-6196 | w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value. | https://nvd.nist.gov/vuln/detail/CVE-2018-6196 |
3,792 | linux | 073c516ff73557a8f7315066856c04b50383ac34 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/073c516ff73557a8f7315066856c04b50383ac34 | nsfs: mark dentry with DCACHE_RCUACCESS
Andrey reported a use-after-free in __ns_get_path():
spin_lock include/linux/spinlock.h:299 [inline]
lockref_get_not_dead+0x19/0x80 lib/lockref.c:179
__ns_get_path+0x197/0x860 fs/nsfs.c:66
open_related_ns+0xda/0x200 fs/nsfs.c:143
sock_ioctl+0x39d/0x440 net/socket.c:10... | 1 | static void *__ns_get_path(struct path *path, struct ns_common *ns)
{
struct vfsmount *mnt = nsfs_mnt;
struct qstr qname = { .name = "", };
struct dentry *dentry;
struct inode *inode;
unsigned long d;
rcu_read_lock();
d = atomic_long_read(&ns->stashed);
if (!d)
goto slow;
dentry = (struct dentry *)d;
if (!... | 283,164,269,815,372,800,000,000,000,000,000,000,000 | nsfs.c | 255,868,983,414,598,720,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-5873 | An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. Due to a race condition when accessing files, a Use After Free condition can occur. This also affects all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before securit... | https://nvd.nist.gov/vuln/detail/CVE-2018-5873 |
3,795 | linux | ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5 | loop: fix concurrent lo_open/lo_release
范龙飞 reports that KASAN can report a use-after-free in __lock_acquire.
The reason is due to insufficient serialization in lo_release(), which
will continue to use the loop device even after it has decremented the
lo_refcnt to zero.
In the meantime, another process can come in, o... | 1 | static void lo_release(struct gendisk *disk, fmode_t mode)
{
struct loop_device *lo = disk->private_data;
int err;
if (atomic_dec_return(&lo->lo_refcnt))
return;
mutex_lock(&lo->lo_ctl_mutex);
if (lo->lo_flags & LO_FLAGS_AUTOCLEAR) {
/*
* In autoclear mode, stop the loop thread
* and remove configu... | 92,709,335,376,815,670,000,000,000,000,000,000,000 | loop.c | 15,664,066,985,517,498,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-5344 | In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-5344 |
3,796 | linux | c1fa0768a8713b135848f78fd43ffc208d8ded70 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c1fa0768a8713b135848f78fd43ffc208d8ded70 | powerpc/tm: Flush TM only if CPU has TM feature
Commit cd63f3c ("powerpc/tm: Fix saving of TM SPRs in core dump")
added code to access TM SPRs in flush_tmregs_to_thread(). However
flush_tmregs_to_thread() does not check if TM feature is available on
CPU before trying to access TM SPRs in order to copy live state to
th... | 1 | static void flush_tmregs_to_thread(struct task_struct *tsk)
{
/*
* If task is not current, it will have been flushed already to
* it's thread_struct during __switch_to().
*
* A reclaim flushes ALL the state or if not in TM save TM SPRs
* in the appropriate thread structures from live.
*/
if (tsk != cu... | 117,879,822,457,848,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-1091 | In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the co... | https://nvd.nist.gov/vuln/detail/CVE-2018-1091 |
3,802 | linux | 57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | netfilter: add back stackpointer size checks
The rationale for removing the check is only correct for rulesets
generated by ip(6)tables.
In iptables, a jump can only occur to a user-defined chain, i.e.
because we size the stack based on number of user-defined chains we
cannot exceed stack size.
However, the underlyi... | 1 | ipt_do_table(struct sk_buff *skb,
const struct nf_hook_state *state,
struct xt_table *table)
{
unsigned int hook = state->hook;
static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long))));
const struct iphdr *ip;
/* Initializing verdict to NF_DROP keeps gcc happy. */
unsigned int ver... | 317,586,211,130,688,100,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-1065 | The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/i... | https://nvd.nist.gov/vuln/detail/CVE-2018-1065 |
3,803 | curl | ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628 | https://github.com/curl/curl | https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628 | smtp: use the upload buffer size for scratch buffer malloc
... not the read buffer size, as that can be set smaller and thus cause
a buffer overflow! CVE-2018-0500
Reported-by: Peter Wu
Bug: https://curl.haxx.se/docs/adv_2018-70a2.html | 1 | CURLcode Curl_smtp_escape_eob(struct connectdata *conn, const ssize_t nread)
{
/* When sending a SMTP payload we must detect CRLF. sequences making sure
they are sent as CRLF.. instead, as a . on the beginning of a line will
be deleted by the server when not part of an EOB terminator and a
genuine CRLF... | 170,694,906,334,543,880,000,000,000,000,000,000,000 | smtp.c | 285,403,495,559,952,680,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-0500 | Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value). | https://nvd.nist.gov/vuln/detail/CVE-2018-0500 |
3,805 | miniupnp | 7aeb624b44f86d335841242ff427433190e7168a | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/7aeb624b44f86d335841242ff427433190e7168a | properly initialize data structure for SOAP parsing in ParseNameValue()
topelt field was not properly initialized.
should fix #268 | 1 | ParseNameValue(const char * buffer, int bufsize,
struct NameValueParserData * data)
{
struct xmlparser parser;
data->l_head = NULL;
data->portListing = NULL;
data->portListingLength = 0;
/* init xmlparser object */
parser.xmlstart = buffer;
parser.xmlsize = bufsize;
parser.data = data;
par... | 18,049,727,750,159,877,000,000,000,000,000,000,000 | upnpreplyparse.c | 41,172,885,683,690,726,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-1000494 | Uninitialized stack variable vulnerability in NameValueParserEndElt (upnpreplyparse.c) in miniupnpd < 2.0 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact | https://nvd.nist.gov/vuln/detail/CVE-2017-1000494 |
3,806 | wildmidi | 814f31d8eceda8401eb812fc2e94ed143fdad0ab | https://github.com/Mindwerks/wildmidi | https://github.com/Mindwerks/wildmidi/commit/814f31d8eceda8401eb812fc2e94ed143fdad0ab | wildmidi_lib.c (WildMidi_Open, WildMidi_OpenBuffer): refuse to proceed if less then 18 bytes of input
Fixes bug #178. | 1 | WM_SYMBOL midi *WildMidi_Open(const char *midifile) {
uint8_t *mididata = NULL;
uint32_t midisize = 0;
uint8_t mus_hdr[] = { 'M', 'U', 'S', 0x1A };
uint8_t xmi_hdr[] = { 'F', 'O', 'R', 'M' };
midi * ret = NULL;
if (!WM_Initialized) {
_WM_GLOBAL_ERROR(__FUNCTION__, __LINE__, WM_ERR_NOT_I... | 49,238,147,717,637,630,000,000,000,000,000,000,000 | wildmidi_lib.c | 287,548,982,026,805,930,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-1000418 | The WildMidi_Open function in WildMIDI since commit d8a466829c67cacbb1700beded25c448d99514e5 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000418 |
3,814 | linux | b86e33075ed1909d8002745b56ecf73b833db143 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b86e33075ed1909d8002745b56ecf73b833db143 | f2fs: fix a dead loop in f2fs_fiemap()
A dead loop can be triggered in f2fs_fiemap() using the test case
as below:
...
fd = open();
fallocate(fd, 0, 0, 4294967296);
ioctl(fd, FS_IOC_FIEMAP, fiemap_buf);
...
It's caused by an overflow in __get_data_block():
...
bh->b_size = map.m_len << inode->i_blkbits;
...
... | 1 | static int __get_data_block(struct inode *inode, sector_t iblock,
struct buffer_head *bh, int create, int flag,
pgoff_t *next_pgofs)
{
struct f2fs_map_blocks map;
int err;
map.m_lblk = iblock;
map.m_len = bh->b_size >> inode->i_blkbits;
map.m_next_pgofs = next_pgofs;
err = f2fs_map_blocks(inode, &map, cre... | 36,840,277,564,373,170,000,000,000,000,000,000,000 | data.c | 145,455,815,818,505,820,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-18257 | The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. | https://nvd.nist.gov/vuln/detail/CVE-2017-18257 |
3,815 | linux | 1572e45a924f254d9570093abde46430c3172e3d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1572e45a924f254d9570093abde46430c3172e3d | perf/core: Fix the perf_cpu_time_max_percent check
Use "proc_dointvec_minmax" instead of "proc_dointvec" to check the input
value from user-space.
If not, we can set a big value and some vars will overflow like
"sysctl_perf_event_sample_rate" which will cause a lot of unexpected
problems.
Signed-off-by: Tan Xiaojun ... | 1 | int perf_cpu_time_max_percent_handler(struct ctl_table *table, int write,
void __user *buffer, size_t *lenp,
loff_t *ppos)
{
int ret = proc_dointvec(table, write, buffer, lenp, ppos);
if (ret || !write)
return ret;
if (sysctl_perf_cpu_time_max_percent == 100 ||
sysctl_perf_cpu_time_max_percent... | 108,483,018,357,036,800,000,000,000,000,000,000,000 | core.c | 304,500,610,601,399,240,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-18255 | The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation. | https://nvd.nist.gov/vuln/detail/CVE-2017-18255 |
3,816 | linux | 30a61ddf8117c26ac5b295e1233eaa9629a94ca3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3 | f2fs: fix race condition in between free nid allocator/initializer
In below concurrent case, allocated nid can be loaded into free nid cache
and be allocated again.
Thread A Thread B
- f2fs_create
- f2fs_new_inode
- alloc_nid
- __insert_nid_to_list(ALLOC_NID_LIST)
- f2fs_balance_fs_bg
- build_free... | 1 | static bool add_free_nid(struct f2fs_sb_info *sbi, nid_t nid, bool build)
{
struct f2fs_nm_info *nm_i = NM_I(sbi);
struct free_nid *i;
struct nat_entry *ne;
int err;
/* 0 nid should not be used */
if (unlikely(nid == 0))
return false;
if (build) {
/* do not add allocated nids */
ne = __lookup_na... | 84,542,765,132,488,550,000,000,000,000,000,000,000 | node.c | 42,220,681,768,883,035,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-18249 | The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads. | https://nvd.nist.gov/vuln/detail/CVE-2017-18249 |
3,817 | cups | 49fa4983f25b64ec29d548ffa3b9782426007df3 | https://github.com/apple/cups | https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3 | DBUS notifications could crash the scheduler (Issue #5143)
- scheduler/ipp.c: Make sure requesting-user-name string is valid UTF-8. | 1 | add_job(cupsd_client_t *con, /* I - Client connection */
cupsd_printer_t *printer, /* I - Destination printer */
mime_type_t *filetype) /* I - First print file type, if any */
{
http_status_t status; /* Policy status */
ipp_attribute_t *attr, /* Current attribute */
*auth_info; /* auth-info attribute ... | 143,641,121,189,248,620,000,000,000,000,000,000,000 | ipp.c | 103,444,657,439,025,130,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-18248 | The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification. | https://nvd.nist.gov/vuln/detail/CVE-2017-18248 |
3,837 | linux | 70feee0e1ef331b22cc51f383d532a0d043fbdcc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/70feee0e1ef331b22cc51f383d532a0d043fbdcc | mlock: fix mlock count can not decrease in race condition
Kefeng reported that when running the follow test, the mlock count in
meminfo will increase permanently:
[1] testcase
linux:~ # cat test_mlockal
grep Mlocked /proc/meminfo
for j in `seq 0 10`
do
for i in `seq 4 15`
do
./p_mlockall >> log &
done... | 1 | static void __munlock_pagevec(struct pagevec *pvec, struct zone *zone)
{
int i;
int nr = pagevec_count(pvec);
int delta_munlocked;
struct pagevec pvec_putback;
int pgrescued = 0;
pagevec_init(&pvec_putback, 0);
/* Phase 1: page isolation */
spin_lock_irq(zone_lru_lock(zone));
for (i = 0; i < nr; i++) {... | 115,707,399,857,902,040,000,000,000,000,000,000,000 | mlock.c | 124,452,116,569,757,200,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-18221 | The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-18221 |
3,838 | linux | 27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2 | net: hns: Fix a skb used after free bug
skb maybe freed in hns_nic_net_xmit_hw() and return NETDEV_TX_OK,
which cause hns_nic_net_xmit to use a freed skb.
BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x62c/0x940...
[17659.112635] alloc_debug_processing+0x18c/0x1a0
[17659.117208] __slab_alloc+0x52c/0x... | 1 | static netdev_tx_t hns_nic_net_xmit(struct sk_buff *skb,
struct net_device *ndev)
{
struct hns_nic_priv *priv = netdev_priv(ndev);
int ret;
assert(skb->queue_mapping < ndev->ae_handle->q_num);
ret = hns_nic_net_xmit_hw(ndev, skb,
&tx_ring_data(priv, skb->queue_mapping));
if (ret == NETDEV_TX_OK... | 286,205,539,332,141,500,000,000,000,000,000,000,000 | hns_enet.c | 118,232,006,227,961,090,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-18218 | In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit. | https://nvd.nist.gov/vuln/detail/CVE-2017-18218 |
3,839 | linux | 27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2 | net: hns: Fix a skb used after free bug
skb maybe freed in hns_nic_net_xmit_hw() and return NETDEV_TX_OK,
which cause hns_nic_net_xmit to use a freed skb.
BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x62c/0x940...
[17659.112635] alloc_debug_processing+0x18c/0x1a0
[17659.117208] __slab_alloc+0x52c/0x... | 1 | int hns_nic_net_xmit_hw(struct net_device *ndev,
struct sk_buff *skb,
struct hns_nic_ring_data *ring_data)
{
struct hns_nic_priv *priv = netdev_priv(ndev);
struct hnae_ring *ring = ring_data->ring;
struct device *dev = ring_to_dev(ring);
struct netdev_queue *dev_queue;
struct skb_frag_struct *frag;
int b... | 111,953,708,316,717,710,000,000,000,000,000,000,000 | hns_enet.c | 118,232,006,227,961,090,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-18218 | In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit. | https://nvd.nist.gov/vuln/detail/CVE-2017-18218 |
3,843 | linux | 6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 | mm/madvise.c: fix madvise() infinite loop under special circumstances
MADVISE_WILLNEED has always been a noop for DAX (formerly XIP) mappings.
Unfortunately madvise_willneed() doesn't communicate this information
properly to the generic madvise syscall implementation. The calling
convention is quite subtle there. ma... | 1 | static long madvise_willneed(struct vm_area_struct *vma,
struct vm_area_struct **prev,
unsigned long start, unsigned long end)
{
struct file *file = vma->vm_file;
#ifdef CONFIG_SWAP
if (!file) {
*prev = vma;
force_swapin_readahead(vma, start, end);
return 0;
}
if (shmem_mapping(fil... | 171,648,586,462,786,750,000,000,000,000,000,000,000 | madvise.c | 200,513,704,618,787,880,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-18208 | The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping. | https://nvd.nist.gov/vuln/detail/CVE-2017-18208 |
3,844 | linux | 28f5a8a7c033cbf3e32277f4cc9c6afd74f05300 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/28f5a8a7c033cbf3e32277f4cc9c6afd74f05300 | ocfs2: should wait dio before inode lock in ocfs2_setattr()
we should wait dio requests to finish before inode lock in
ocfs2_setattr(), otherwise the following deadlock will happen:
process 1 process 2 process 3
truncate file 'A' end_io of writing file 'A' receiving the ... | 1 | int ocfs2_setattr(struct dentry *dentry, struct iattr *attr)
{
int status = 0, size_change;
int inode_locked = 0;
struct inode *inode = d_inode(dentry);
struct super_block *sb = inode->i_sb;
struct ocfs2_super *osb = OCFS2_SB(sb);
struct buffer_head *bh = NULL;
handle_t *handle = NULL;
struct dquot *transfer_to... | 12,293,169,081,478,398,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2017-18204 | The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests. | https://nvd.nist.gov/vuln/detail/CVE-2017-18204 |
3,845 | linux | b9a41d21dceadf8104812626ef85dc56ee8a60ed | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed | dm: fix race between dm_get_from_kobject() and __dm_destroy()
The following BUG_ON was hit when testing repeat creation and removal of
DM devices:
kernel BUG at drivers/md/dm.c:2919!
CPU: 7 PID: 750 Comm: systemd-udevd Not tainted 4.1.44
Call Trace:
[<ffffffff81649e8b>] dm_get_from_kobject+0x34/0x3a
... | 1 | struct mapped_device *dm_get_from_kobject(struct kobject *kobj)
{
struct mapped_device *md;
md = container_of(kobj, struct mapped_device, kobj_holder.kobj);
if (test_bit(DMF_FREEING, &md->flags) ||
dm_deleting_md(md))
return NULL;
dm_get(md);
return md;
}
| 232,285,841,910,144,100,000,000,000,000,000,000,000 | dm.c | 56,799,825,473,684,530,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-18203 | The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices. | https://nvd.nist.gov/vuln/detail/CVE-2017-18203 |
3,847 | linux | 638164a2718f337ea224b747cf5977ef143166a4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/638164a2718f337ea224b747cf5977ef143166a4 | f2fs: fix potential panic during fstrim
As Ju Hyung Park reported:
"When 'fstrim' is called for manual trim, a BUG() can be triggered
randomly with this patch.
I'm seeing this issue on both x86 Desktop and arm64 Android phone.
On x86 Desktop, this was caused during Ubuntu boot-up. I have a
cronjob installed which c... | 1 | void f2fs_wait_discard_bios(struct f2fs_sb_info *sbi)
{
__issue_discard_cmd(sbi, false);
__drop_discard_cmd(sbi);
__wait_discard_cmd(sbi, false);
}
| 66,587,864,384,024,680,000,000,000,000,000,000,000 | segment.c | 277,647,022,130,075,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-18200 | The f2fs implementation in the Linux kernel before 4.14 mishandles reference counts associated with f2fs_wait_discard_bios calls, which allows local users to cause a denial of service (BUG), as demonstrated by fstrim. | https://nvd.nist.gov/vuln/detail/CVE-2017-18200 |
3,849 | linux | dad48e73127ba10279ea33e6dbc8d3905c4d31c0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dad48e73127ba10279ea33e6dbc8d3905c4d31c0 | f2fs: fix a bug caused by NULL extent tree
Thread A: Thread B:
-f2fs_remount
-sbi->mount_opt.opt = 0;
<--- -f2fs_iget
-do_read_inode
-f2fs_init_extent_tree
-F2FS_I(inode)->extent_tree is NULL
-default_options && parse_options
-remount return
... | 1 | bool f2fs_init_extent_tree(struct inode *inode, struct f2fs_extent *i_ext)
{
struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
struct extent_tree *et;
struct extent_node *en;
struct extent_info ei;
if (!f2fs_may_extent_tree(inode)) {
/* drop largest extent */
if (i_ext && i_ext->len) {
i_ext->len = 0;
ret... | 144,565,331,810,619,090,000,000,000,000,000,000,000 | extent_cache.c | 121,324,559,268,227,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-18193 | fs/f2fs/extent_cache.c in the Linux kernel before 4.13 mishandles extent trees, which allows local users to cause a denial of service (BUG) via an application with multiple threads. | https://nvd.nist.gov/vuln/detail/CVE-2017-18193 |
3,850 | cups | afa80cb2b457bf8d64f775bed307588610476c41 | https://github.com/apple/cups | https://github.com/apple/cups/commit/afa80cb2b457bf8d64f775bed307588610476c41 | Don't treat "localhost.localdomain" as an allowed replacement for localhost, since it isn't. | 1 | valid_host(cupsd_client_t *con) /* I - Client connection */
{
cupsd_alias_t *a; /* Current alias */
cupsd_netif_t *netif; /* Current network interface */
const char *end; /* End character */
char *ptr; /* Pointer into host value */
/*
* Copy the Host: header for later use...
*/
strlcpy(con->... | 159,854,871,526,072,820,000,000,000,000,000,000,000 | client.c | 181,717,129,039,375,560,000,000,000,000,000,000,000 | [
"CWE-290"
] | CVE-2017-18190 | A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS no... | https://nvd.nist.gov/vuln/detail/CVE-2017-18190 |
3,851 | mbedtls | 83c9f495ffe70c7dd280b41fdfd4881485a3bc28 | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28 | Prevent bounds check bypass through overflow in PSK identity parsing
The check `if( *p + n > end )` in `ssl_parse_client_psk_identity` is
unsafe because `*p + n` might overflow, thus bypassing the check. As
`n` is a user-specified value up to 65K, this is relevant if the
library happens to be located in the last 65K o... | 1 | static int ssl_parse_client_psk_identity( mbedtls_ssl_context *ssl, unsigned char **p,
const unsigned char *end )
{
int ret = 0;
size_t n;
if( ssl->conf->f_psk == NULL &&
( ssl->conf->psk == NULL || ssl->conf->psk_identity == NULL ||
ssl->conf->ps... | 246,504,953,524,229,660,000,000,000,000,000,000,000 | ssl_srv.c | 242,941,228,807,408,900,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-18187 | In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18187 |
3,852 | linux | 8dca4a41f1ad65043a78c2338d9725f859c8d2c3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8dca4a41f1ad65043a78c2338d9725f859c8d2c3 | pinctrl/amd: Drop pinctrl_unregister for devm_ registered device
It's not necessary to unregister pin controller device registered
with devm_pinctrl_register() and using pinctrl_unregister() leads
to a double free.
Fixes: 3bfd44306c65 ("pinctrl: amd: Add support for additional GPIO")
Signed-off-by: Wei Yongjun <weiyo... | 1 | static int amd_gpio_remove(struct platform_device *pdev)
{
struct amd_gpio *gpio_dev;
gpio_dev = platform_get_drvdata(pdev);
gpiochip_remove(&gpio_dev->gc);
pinctrl_unregister(gpio_dev->pctrl);
return 0;
}
| 100,344,955,333,259,860,000,000,000,000,000,000,000 | pinctrl-amd.c | 137,063,333,804,755,300,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18174 | In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free. | https://nvd.nist.gov/vuln/detail/CVE-2017-18174 |
3,858 | linux | 2638fd0f92d4397884fd991d8f4925cb3f081901 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901 | netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
Denys provided an awesome KASAN report pointing to an use
after free in xt_TCPMSS
I have provided three patches to fix this issue, either in xt_TCPMSS or
in xt_tcpudp.c. It seems xt_TCPMSS patch has the smallest possible
impact.
Signed-off-by: Eric Dumazet <e... | 1 | tcpmss_mangle_packet(struct sk_buff *skb,
const struct xt_action_param *par,
unsigned int family,
unsigned int tcphoff,
unsigned int minlen)
{
const struct xt_tcpmss_info *info = par->targinfo;
struct tcphdr *tcph;
int len, tcp_hdrlen;
unsigned int i;
__be16 oldval;
u16 newmss;
u8 *op... | 250,029,302,786,329,280,000,000,000,000,000,000,000 | xt_TCPMSS.c | 261,370,175,787,540,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-18017 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. | https://nvd.nist.gov/vuln/detail/CVE-2017-18017 |
3,859 | linux | 21b5944350052d2583e82dd59b19a9ba94a007f0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0 | net: Fix double free and memory corruption in get_net_ns_by_id()
(I can trivially verify that that idr_remove in cleanup_net happens
after the network namespace count has dropped to zero --EWB)
Function get_net_ns_by_id() does not check for net::count
after it has found a peer in netns_ids idr.
It may dereference a... | 1 | struct net *get_net_ns_by_id(struct net *net, int id)
{
struct net *peer;
if (id < 0)
return NULL;
rcu_read_lock();
spin_lock_bh(&net->nsid_lock);
peer = idr_find(&net->netns_ids, id);
if (peer)
get_net(peer);
spin_unlock_bh(&net->nsid_lock);
rcu_read_unlock();
return peer;
}
| 126,228,411,105,494,450,000,000,000,000,000,000,000 | net_namespace.c | 229,167,366,123,156,130,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-15129 | A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. Th... | https://nvd.nist.gov/vuln/detail/CVE-2017-15129 |
3,860 | linux | 1e3921471354244f70fe268586ff94a97a6dd4df | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df | userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size
This oops:
kernel BUG at fs/hugetlbfs/inode.c:484!
RIP: remove_inode_hugepages+0x3d0/0x410
Call Trace:
hugetlbfs_setattr+0xd9/0x130
notify_change+0x292/0x410
do_truncate+0x65/0xa0
do_sys_ftruncate.constprop.3+0x11a/0x18... | 1 | int hugetlb_mcopy_atomic_pte(struct mm_struct *dst_mm,
pte_t *dst_pte,
struct vm_area_struct *dst_vma,
unsigned long dst_addr,
unsigned long src_addr,
struct page **pagep)
{
int vm_shared = dst_vma->vm_flags & VM_SHARED;
struct hstate *h = hstate_vma(dst_vma);
pte_t _dst_pte;... | 285,571,524,825,774,600,000,000,000,000,000,000,000 | hugetlb.c | 273,321,831,039,362,950,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-15128 | A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG). | https://nvd.nist.gov/vuln/detail/CVE-2017-15128 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.