idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
3,649
radare2
40b021ba29c8f90ccf7c879fde2580bc73a17e8e
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/40b021ba29c8f90ccf7c879fde2580bc73a17e8e
None
1
static bool r_bin_mdmp_init_directory(struct r_bin_mdmp_obj *obj) { int i; ut8 *directory_base; struct minidump_directory *entry; directory_base = obj->b->buf + obj->hdr->stream_directory_rva; sdb_num_set (obj->kv, "mdmp_directory.offset", obj->hdr->stream_directory_rva, 0); sdb_set (obj->kv, "mdmp_direc...
275,785,464,801,853,400,000,000,000,000,000,000,000
mdmp.c
317,085,147,769,769,330,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14016
The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Mini Crash Dump file.
https://nvd.nist.gov/vuln/detail/CVE-2018-14016
3,651
libpng
8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
https://github.com/glennrp/libpng
https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
[libpng16] Fix the calculation of row_factor in png_check_chunk_length (Bug report by Thuan Pham, SourceForge issue #278)
1
png_check_chunk_length(png_const_structrp png_ptr, const png_uint_32 length) { png_alloc_size_t limit = PNG_UINT_31_MAX; # ifdef PNG_SET_USER_LIMITS_SUPPORTED if (png_ptr->user_chunk_malloc_max > 0 && png_ptr->user_chunk_malloc_max < limit) limit = png_ptr->user_chunk_malloc_max; # elif PNG_USER_CHU...
110,259,438,980,219,460,000,000,000,000,000,000,000
pngrutil.c
326,867,964,072,458,030,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-13785
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-13785
3,652
linux
9f645bcc566a1e9f921bdae7528a01ced5bc3713
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9f645bcc566a1e9f921bdae7528a01ced5bc3713
video: uvesafb: Fix integer overflow in allocation cmap->len can get close to INT_MAX/2, allowing for an integer overflow in allocation. This uses kmalloc_array() instead to catch the condition. Reported-by: Dr Silvio Cesare of InfoSect <silvio.cesare@gmail.com> Fixes: 8bdb3a2d7df48 ("uvesafb: the driver core") Cc: s...
1
static int uvesafb_setcmap(struct fb_cmap *cmap, struct fb_info *info) { struct uvesafb_pal_entry *entries; int shift = 16 - dac_width; int i, err = 0; if (info->var.bits_per_pixel == 8) { if (cmap->start + cmap->len > info->cmap.start + info->cmap.len || cmap->start < info->cmap.start) return -EINVAL...
129,461,505,887,171,650,000,000,000,000,000,000,000
uvesafb.c
8,702,348,276,085,379,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-13406
An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.
https://nvd.nist.gov/vuln/detail/CVE-2018-13406
3,653
linux
0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
Fix up non-directory creation in SGID directories sgid directories have special semantics, making newly created files in the directory belong to the group of the directory, and newly created subdirectories will also become sgid. This is historically used for group-shared directories. But group directories writable b...
1
void inode_init_owner(struct inode *inode, const struct inode *dir, umode_t mode) { inode->i_uid = current_fsuid(); if (dir && dir->i_mode & S_ISGID) { inode->i_gid = dir->i_gid; if (S_ISDIR(mode)) mode |= S_ISGID; } else inode->i_gid = current_fsgid(); inode->i_mode = mode; }
215,180,090,082,961,630,000,000,000,000,000,000,000
inode.c
212,299,787,291,086,200,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2018-13405
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain...
https://nvd.nist.gov/vuln/detail/CVE-2018-13405
3,654
FFmpeg
00e8181bd97c834fe60751b0c511d4bb97875f78
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/00e8181bd97c834fe60751b0c511d4bb97875f78
avcodec/ac3_parser: Check init_get_bits8() for failure Fixes: null pointer dereference Fixes: ffmpeg_crash_6.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Reviewed-by: Paul B Mahol <onemda@gmail.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
int avpriv_ac3_parse_header(AC3HeaderInfo **phdr, const uint8_t *buf, size_t size) { GetBitContext gb; AC3HeaderInfo *hdr; int err; if (!*phdr) *phdr = av_mallocz(sizeof(AC3HeaderInfo)); if (!*phdr) return AVERROR(ENOMEM); hdr = *phdr; init_ge...
236,477,656,578,978,820,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-13303
In FFmpeg 4.0.1, a missing check for failure of a call to init_get_bits8() in the avpriv_ac3_parse_header function in libavcodec/ac3_parser.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-13303
3,655
FFmpeg
2aa9047486dbff12d9e040f917e5f799ed2fd78b
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2aa9047486dbff12d9e040f917e5f799ed2fd78b
avcodec/mpeg4videodec: Check read profile before setting it Fixes: null pointer dereference Fixes: ffmpeg_crash_7.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; unsigned startcode, v; int ret; int vol = 0; /* search next start code */ align_get_bits(gb); if (!s->studio_profile && s->avctx->bits_per_raw_sample != 8) s->avctx->bits_per_...
328,896,097,922,084,930,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-13301
In FFmpeg 4.0.1, due to a missing check of a profile value before setting it, the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-13301
3,657
linux
23fcb3340d033d9f081e21e6c12c2db7eaa541d3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3
xfs: More robust inode extent count validation When the inode is in extent format, it can't have more extents that fit in the inode fork. We don't currenty check this, and so this corruption goes unnoticed by the inode verifiers. This can lead to crashes operating on invalid in-memory structures. Attempts to access s...
1
xfs_dinode_verify( struct xfs_mount *mp, xfs_ino_t ino, struct xfs_dinode *dip) { xfs_failaddr_t fa; uint16_t mode; uint16_t flags; uint64_t flags2; uint64_t di_size; if (dip->di_magic != cpu_to_be16(XFS_DINODE_MAGIC)) return __this_address; /* Verify v3 integrity information first */ if (dip->di...
274,742,324,962,726,900,000,000,000,000,000,000,000
xfs_inode_buf.c
103,496,325,547,574,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-13095
An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
https://nvd.nist.gov/vuln/detail/CVE-2018-13095
3,658
linux
bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a
xfs: don't call xfs_da_shrink_inode with NULL bp xfs_attr3_leaf_create may have errored out before instantiating a buffer, for example if the blkno is out of range. In that case there is no work to do to remove it, and in fact xfs_da_shrink_inode will lead to an oops if we try. This also seems to fix a flaw where th...
1
xfs_attr_shortform_to_leaf( struct xfs_da_args *args, struct xfs_buf **leaf_bp) { xfs_inode_t *dp; xfs_attr_shortform_t *sf; xfs_attr_sf_entry_t *sfe; xfs_da_args_t nargs; char *tmpbuffer; int error, i, size; xfs_dablk_t blkno; struct xfs_buf *bp; xfs_ifork_t *ifp; trace_xfs_attr_sf_to_leaf(args); dp = ...
255,451,512,913,001,000,000,000,000,000,000,000,000
xfs_attr_leaf.c
330,567,582,969,333,100,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-13094
An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.
https://nvd.nist.gov/vuln/detail/CVE-2018-13094
3,662
gpac
bceb03fd2be95097a7b409ea59914f332fb6bc86
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/bceb03fd2be95097a7b409ea59914f332fb6bc86
fixed 2 possible heap overflows (inc. #1088)
1
GF_Err hdlr_dump(GF_Box *a, FILE * trace) { GF_HandlerBox *p = (GF_HandlerBox *)a; gf_isom_box_dump_start(a, "HandlerBox", trace); if (p->nameUTF8 && (u32) p->nameUTF8[0] == strlen(p->nameUTF8+1)) { fprintf(trace, "hdlrType=\"%s\" Name=\"%s\" ", gf_4cc_to_str(p->handlerType), p->nameUTF8+1); } else { fpri...
20,155,211,497,845,732,000,000,000,000,000,000,000
box_dump.c
2,944,473,506,997,116,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-13006
An issue was discovered in MP4Box in GPAC 0.7.1. There is a heap-based buffer over-read in the isomedia/box_dump.c function hdlr_dump.
https://nvd.nist.gov/vuln/detail/CVE-2018-13006
3,679
linux
81f9c4e4177d31ced6f52a89bb70e93bfb77ca03
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/81f9c4e4177d31ced6f52a89bb70e93bfb77ca03
Merge tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace Pull tracing fixes from Steven Rostedt: "This contains a few fixes and a clean up. - a bad merge caused an "endif" to go in the wrong place in scripts/Makefile.build - softirq tracing fix for tracing that cor...
1
predicate_parse(const char *str, int nr_parens, int nr_preds, parse_pred_fn parse_pred, void *data, struct filter_parse_error *pe) { struct prog_entry *prog_stack; struct prog_entry *prog; const char *ptr = str; char *inverts = NULL; int *op_stack; int *top; int invert = 0; int ret = -ENOMEM; int len; int...
269,743,203,244,690,430,000,000,000,000,000,000,000
trace_events_filter.c
236,797,272,490,507,370,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-12714
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-...
https://nvd.nist.gov/vuln/detail/CVE-2018-12714
3,680
linux
bd23a7269834dc7c1f93e83535d16ebc44b75eba
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bd23a7269834dc7c1f93e83535d16ebc44b75eba
virt: vbox: Only copy_from_user the request-header once In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the 'version', 'size_in', and 'size_out' fields of 'hdr' are verified. Before this commit, after the checks a buffe...
1
static long vbg_misc_device_ioctl(struct file *filp, unsigned int req, unsigned long arg) { struct vbg_session *session = filp->private_data; size_t returned_size, size; struct vbg_ioctl_hdr hdr; bool is_vmmdev_req; int ret = 0; void *buf; if (copy_from_user(&hdr, (void *)arg, sizeof(hdr))) return -EFAU...
3,708,566,526,586,698,000,000,000,000,000,000,000
vboxguest_linux.c
280,521,136,845,643,650,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2018-12633
An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr....
https://nvd.nist.gov/vuln/detail/CVE-2018-12633
3,681
FFmpeg
b3332a182f8ba33a34542e4a0370f38b914ccf7d
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d
avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile These 2 fields are not always the same, it is simpler to always use the same field for detecting studio profile Fixes: null pointer dereference Fixes: ffmpeg_crash_3.avi Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh...
1
av_cold void ff_idctdsp_init(IDCTDSPContext *c, AVCodecContext *avctx) { const unsigned high_bit_depth = avctx->bits_per_raw_sample > 8; if (avctx->lowres==1) { c->idct_put = ff_jref_idct4_put; c->idct_add = ff_jref_idct4_add; c->idct = ff_j_rev_dct4; c->perm_type = FF_ID...
258,201,715,643,119,100,000,000,000,000,000,000,000
idctdsp.c
24,121,040,549,549,385,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-12460
libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-12460
3,682
FFmpeg
b3332a182f8ba33a34542e4a0370f38b914ccf7d
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d
avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile These 2 fields are not always the same, it is simpler to always use the same field for detecting studio profile Fixes: null pointer dereference Fixes: ffmpeg_crash_3.avi Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh...
1
av_cold void ff_mpv_idct_init(MpegEncContext *s) { ff_idctdsp_init(&s->idsp, s->avctx); /* load & permutate scantables * note: only wmv uses different ones */ if (s->alternate_scan) { ff_init_scantable(s->idsp.idct_permutation, &s->inter_scantable, ff_alternate_vertical_scan); ...
214,617,330,672,650,500,000,000,000,000,000,000,000
mpegvideo.c
15,848,255,372,654,095,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-12460
libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-12460
3,683
FFmpeg
2fc108f60f98cd00813418a8754a46476b404a3c
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2fc108f60f98cd00813418a8754a46476b404a3c
avcodec/mpeg4videodec: Clear bits_per_raw_sample if it has originated from a previous instance Fixes: assertion failure Fixes: ffmpeg_crash_5.avi Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <michael@niede...
1
int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; unsigned startcode, v; int ret; int vol = 0; /* search next start code */ align_get_bits(gb); if (s->codec_tag == AV_RL32("WV1F") && show_bits(gb, 24) == 0x575630) { skip...
20,215,823,895,074,912,000,000,000,000,000,000,000
mpeg4videodec.c
139,065,503,574,081,020,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-12459
An inconsistent bits-per-sample value in the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c in FFmpeg 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-12459
3,684
FFmpeg
e1182fac1afba92a4975917823a5f644bee7e6e8
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/e1182fac1afba92a4975917823a5f644bee7e6e8
avcodec/mpeg4videoenc: Use 64 bit for times in mpeg4_encode_gop_header() Fixes truncation Fixes Assertion n <= 31 && value < (1U << n) failed at libavcodec/put_bits.h:169 Fixes: ffmpeg_crash_2.avi Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böhme, Andrew Santosa and Alexandru RazvanCaciulescu with AFLSmart...
1
static void mpeg4_encode_gop_header(MpegEncContext *s) { int hours, minutes, seconds; int64_t time; put_bits(&s->pb, 16, 0); put_bits(&s->pb, 16, GOP_STARTCODE); time = s->current_picture_ptr->f->pts; if (s->reordered_input_picture[1]) time = FFMIN(time, s->reordered_input_picture...
141,072,668,666,883,980,000,000,000,000,000,000,000
mpeg4videoenc.c
245,539,507,026,391,350,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-12458
An improper integer type in the mpeg4_encode_gop_header function in libavcodec/mpeg4videoenc.c in FFmpeg 2.8 and 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-12458
3,687
radare2
90b71c017a7fa9732fe45fd21b245ee051b1f548
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548
Fix #10293 - Use-after-free in r_anal_bb_free()
1
R_API void r_anal_bb_free(RAnalBlock *bb) { if (!bb) { return; } r_anal_cond_free (bb->cond); R_FREE (bb->fingerprint); r_anal_diff_free (bb->diff); bb->diff = NULL; R_FREE (bb->op_bytes); r_anal_switch_op_free (bb->switch_op); bb->switch_op = NULL; bb->fingerprint = NULL; bb->cond = NULL; R_FREE (bb->lab...
33,807,903,809,090,475,000,000,000,000,000,000,000
bb.c
272,606,549,223,286,240,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-12320
There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12320
3,688
mruby
faa4eaf6803bd11669bc324b4c34e7162286bfa3
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/faa4eaf6803bd11669bc324b4c34e7162286bfa3
`mrb_class_real()` did not work for `BasicObject`; fix #4037
1
mrb_class_real(struct RClass* cl) { if (cl == 0) return NULL; while ((cl->tt == MRB_TT_SCLASS) || (cl->tt == MRB_TT_ICLASS)) { cl = cl->super; } return cl; }
120,395,878,351,176,830,000,000,000,000,000,000,000
class.c
206,993,897,454,459,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-12249
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-12249
3,689
mruby
778500563a9f7ceba996937dc886bd8cde29b42b
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b
Extend stack when pushing arguments that does not fit in; fix #4038
1
fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mrb_bool resume, mrb_bool vmexec) { struct mrb_context *c = fiber_check(mrb, self); struct mrb_context *old_c = mrb->c; mrb_value value; fiber_check_cfunc(mrb, c); if (resume && c->status == MRB_FIBER_TRANSFERRED) { mrb_...
148,482,836,348,799,490,000,000,000,000,000,000,000
fiber.c
104,372,639,444,452,630,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-12248
An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.
https://nvd.nist.gov/vuln/detail/CVE-2018-12248
3,690
mruby
55edae0226409de25e59922807cb09acb45731a2
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/55edae0226409de25e59922807cb09acb45731a2
Allow `Object#clone` to copy frozen status only; fix #4036 Copying all flags from the original object may overwrite the clone's flags e.g. the embedded flag.
1
mrb_obj_clone(mrb_state *mrb, mrb_value self) { struct RObject *p; mrb_value clone; if (mrb_immediate_p(self)) { mrb_raisef(mrb, E_TYPE_ERROR, "can't clone %S", self); } if (mrb_type(self) == MRB_TT_SCLASS) { mrb_raise(mrb, E_TYPE_ERROR, "can't clone singleton class"); } p = (struct RObject*)mrb_...
229,363,253,371,945,330,000,000,000,000,000,000,000
kernel.c
163,099,176,507,490,390,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-12247
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag).
https://nvd.nist.gov/vuln/detail/CVE-2018-12247
3,691
linux
6d8c50dcb029872b298eea68cc6209c866fd3e14
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
socket: close race condition between sock_close() and sockfs_setattr() fchownat() doesn't even hold refcnt of fd until it figures out fd is really needed (otherwise is ignored) and releases it after it resolves the path. This means sock_close() could race with sockfs_setattr(), which leads to a NULL pointer dereferenc...
1
static int sock_close(struct inode *inode, struct file *filp) { sock_release(SOCKET_I(inode)); return 0; }
84,494,788,491,717,655,000,000,000,000,000,000,000
socket.c
177,755,458,975,155,360,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2018-12232
In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock...
https://nvd.nist.gov/vuln/detail/CVE-2018-12232
3,693
mruby
b64ce17852b180dfeea81cf458660be41a78974d
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/b64ce17852b180dfeea81cf458660be41a78974d
Should not call `initialize_copy` for `TT_ICLASS`; fix #4027 Since `TT_ICLASS` is a internal object that should never be revealed to Ruby world.
1
init_copy(mrb_state *mrb, mrb_value dest, mrb_value obj) { switch (mrb_type(obj)) { case MRB_TT_CLASS: case MRB_TT_MODULE: copy_class(mrb, dest, obj); mrb_iv_copy(mrb, dest, obj); mrb_iv_remove(mrb, dest, mrb_intern_lit(mrb, "__classname__")); break; case MRB_TT_OBJECT: c...
180,805,267,474,604,700,000,000,000,000,000,000,000
kernel.c
284,772,638,438,592,230,000,000,000,000,000,000,000
[ "CWE-824" ]
CVE-2018-11743
The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-11743
3,696
Espruino
ce1924193862d58cb43d3d4d9dada710a8361b89
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89
fix jsvGetString regression
1
size_t jsvGetString(const JsVar *v, char *str, size_t len) { assert(len>0); const char *s = jsvGetConstString(v); if (s) { /* don't use strncpy here because we don't * want to pad the entire buffer with zeros */ len--; int l = 0; while (*s && l<len) { str[l] = s[l]; l++; ...
159,195,423,267,930,780,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-11596
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11596
3,699
Espruino
8a44b04b584b3d3ab1cb68fed410f7ecb165e50e
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e
Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421)
1
JsVar *jswrap_graphics_createArrayBuffer(int width, int height, int bpp, JsVar *options) { if (width<=0 || height<=0 || width>32767 || height>32767) { jsExceptionHere(JSET_ERROR, "Invalid Size"); return 0; } if (!isValidBPP(bpp)) { jsExceptionHere(JSET_ERROR, "Invalid BPP"); return 0; } JsVar...
250,096,056,660,193,630,000,000,000,000,000,000,000
jswrap_graphics.c
260,225,868,029,461,130,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11592
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11592
3,700
Espruino
b6d362f6a1f2de0b3e7604848116efb509196bf4
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4
Add sanity check for debug trace print statement (fix #1420)
1
void _jsvTrace(JsVar *var, int indent, JsVar *baseVar, int level) { #ifdef SAVE_ON_FLASH jsiConsolePrint("Trace unimplemented in this version.\n"); #else int i; for (i=0;i<indent;i++) jsiConsolePrint(" "); if (!var) { jsiConsolePrint("undefined"); return; } jsvTraceLockInfo(var); int lowestLeve...
53,958,977,605,870,530,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-11591
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11591
3,701
linux
0a0b98734479aa5b3c671d5190e86273372cab95
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95
compat: fix 4-byte infoleak via uninitialized struct field Commit 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to native counterparts") removed the memset() in compat_get_timex(). Since then, the compat adjtimex syscall can invoke do_adjtimex() with an uninitialized ->tai. If do_adjtimex() doesn't write...
1
int compat_get_timex(struct timex *txc, const struct compat_timex __user *utp) { struct compat_timex tx32; if (copy_from_user(&tx32, utp, sizeof(struct compat_timex))) return -EFAULT; txc->modes = tx32.modes; txc->offset = tx32.offset; txc->freq = tx32.freq; txc->maxerror = tx32.maxerror; txc->esterror...
24,540,572,475,707,357,000,000,000,000,000,000,000
compat.c
17,743,863,291,646,434,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-11508
The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.
https://nvd.nist.gov/vuln/detail/CVE-2018-11508
3,702
radare2
77c47cf873dd55b396da60baa2ca83bbd39e4add
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add
Fix #9903 - oobread in RAnal.sh
1
static int sh_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) { ut8 op_MSB,op_LSB; int ret; if (!data) return 0; memset (op, '\0', sizeof (RAnalOp)); op->addr = addr; op->type = R_ANAL_OP_TYPE_UNK; op->jump = op->fail = -1; op->ptr = op->val = -1; op->size = 2; op_MSB = anal->big_...
249,622,554,086,958,550,000,000,000,000,000,000,000
anal_sh.c
165,574,273,690,825,930,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11384
The sh_op() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11384
3,703
radare2
d04c78773f6959bcb427453f8e5b9824d5ba9eff
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff
Fix #10091 - crash in AVR analysis
1
INST_HANDLER (sts) { // STS k, Rr int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4); int k = (buf[3] << 8) | buf[2]; op->ptr = k; ESIL_A ("r%d,", r); __generic_ld_st (op, "ram", 0, 1, 0, k, 1); op->cycles = 2; }
145,404,004,174,958,070,000,000,000,000,000,000,000
anal_avr.c
49,931,515,066,285,090,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11382
The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11382
3,704
radare2
3fcf41ed96ffa25b38029449520c8d0a198745f3
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3
Fix #9902 - Fix oobread in RBin.string_scan_range
1
static int string_scan_range(RList *list, RBinFile *bf, int min, const ut64 from, const ut64 to, int type) { ut8 tmp[R_STRING_SCAN_BUFFER_SIZE]; ut64 str_start, needle = from; int count = 0, i, rc, runes; int str_type = R_STRING_TYPE_DETECT; if (type == -1) { type = R_STRING_TYPE_DETECT; } if (from >...
227,698,591,978,418,270,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11381
The string_scan_range() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11381
3,707
radare2
60208765887f5f008b3b9a883f3addc8bdb9c134
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134
Fix #9970 - heap oobread in mach0 parser (#10026)
1
static int parse_import_ptr(struct MACH0_(obj_t)* bin, struct reloc_t *reloc, int idx) { int i, j, sym, wordsize; ut32 stype; wordsize = MACH0_(get_bits)(bin) / 8; if (idx < 0 || idx >= bin->nsymtab) { return 0; } if ((bin->symtab[idx].n_desc & REFERENCE_TYPE) == REFERENCE_FLAG_UNDEFINED_LAZY) { stype = S_LAZ...
318,868,786,944,603,400,000,000,000,000,000,000,000
mach0.c
163,775,332,068,251,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11380
The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted Mach-O file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11380
3,708
radare2
4e1cf0d3e6f6fe2552a269def0af1cd2403e266c
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c
Fix crash in pe
1
static int get_debug_info(struct PE_(r_bin_pe_obj_t)* bin, PE_(image_debug_directory_entry)* dbg_dir_entry, ut8* dbg_data, int dbg_data_len, SDebugInfo* res) { #define SIZEOF_FILE_NAME 255 int i = 0; const char* basename; if (!dbg_data) { return 0; } switch (dbg_dir_entry->Type) { case IMAGE_DEBUG_TYPE_CODEVI...
38,287,125,071,570,595,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11379
The get_debug_info() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted PE file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11379
3,710
radare2
25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4
Fix invalid free in RAnal.avr
1
INST_HANDLER (sbrx) { // SBRC Rr, b int b = buf[0] & 0x7; int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x01) << 4); RAnalOp next_op; avr_op_analyze (anal, &next_op, op->addr + op->size, buf + op->size, len - op->size, cpu); r_strbuf_fini (&next_op.esil); op->jump = op->addr + next_op.size + 2; op->cy...
117,498,818,528,294,220,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11377
The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11377
3,713
radare2
041e53cab7ca33481ae45ecd65ad596976d78e68
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68
Fix crash in anal.avr
1
INST_HANDLER (lds) { // LDS Rd, k int d = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4); int k = (buf[3] << 8) | buf[2]; op->ptr = k; __generic_ld_st (op, "ram", 0, 1, 0, k, 0); ESIL_A ("r%d,=,", d); }
293,018,390,461,922,750,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11375
The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11375
3,714
linux
f09444639099584bc4784dfcd85ada67c6f33e0f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f09444639099584bc4784dfcd85ada67c6f33e0f
coresight: fix kernel panic caused by invalid CPU Commit d52c9750f150 ("coresight: reset "enable_sink" flag when need be") caused a kernel panic because of the using of an invalid value: after 'for_each_cpu(cpu, mask)', value of local variable 'cpu' become invalid, causes following 'cpu_to_node' access invalid memory ...
1
static void *etm_setup_aux(int event_cpu, void **pages, int nr_pages, bool overwrite) { int cpu; cpumask_t *mask; struct coresight_device *sink; struct etm_event_data *event_data = NULL; event_data = alloc_event_data(event_cpu); if (!event_data) return NULL; /* * In theory nothing prevent tracers in ...
116,152,585,108,812,740,000,000,000,000,000,000,000
coresight-etm-perf.c
265,668,461,210,710,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-11232
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
https://nvd.nist.gov/vuln/detail/CVE-2018-11232
3,715
linux
9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
cdrom: information leak in cdrom_ioctl_media_changed() This cast is wrong. "cdi->capacity" is an int and "arg" is an unsigned long. The way the check is written now, if one of the high 32 bits is set then we could read outside the info->slots[] array. This bug is pretty old and it predates git. Reviewed-by: Christ...
1
static int cdrom_ioctl_media_changed(struct cdrom_device_info *cdi, unsigned long arg) { struct cdrom_changer_info *info; int ret; cd_dbg(CD_DO_IOCTL, "entering CDROM_MEDIA_CHANGED\n"); if (!CDROM_CAN(CDC_MEDIA_CHANGED)) return -ENOSYS; /* cannot select disc or select current disc */ if (!CDROM_CAN(CDC_SE...
336,721,753,792,307,100,000,000,000,000,000,000,000
cdrom.c
93,333,265,289,730,710,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-10940
The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
https://nvd.nist.gov/vuln/detail/CVE-2018-10940
3,716
libgit2
9844d38bed10e9ff17174434b3421b227ae710f3
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3
delta: fix out-of-bounds read of delta When computing the offset and length of the delta base, we repeatedly increment the `delta` pointer without checking whether we have advanced past its end already, which can thus result in an out-of-bounds read. Fix this by repeatedly checking whether we have reached the end. Add...
1
int git_delta_apply( void **out, size_t *out_len, const unsigned char *base, size_t base_len, const unsigned char *delta, size_t delta_len) { const unsigned char *delta_end = delta + delta_len; size_t base_sz, res_sz, alloc_sz; unsigned char *res_dp; *out = NULL; *out_len = 0; /* * Check that the base s...
129,712,746,807,172,540,000,000,000,000,000,000,000
delta.c
58,338,496,957,847,360,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10888
A flaw was found in libgit2 before version 0.27.3. A missing check in git_delta_apply function in delta.c file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service.
https://nvd.nist.gov/vuln/detail/CVE-2018-10888
3,717
libgit2
c1577110467b701dcbcf9439ac225ea851b47d22
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22
delta: fix overflow when computing limit When checking whether a delta base offset and length fit into the base we have in memory already, we can trigger an overflow which breaks the check. This would subsequently result in us reading memory from out of bounds of the base. The issue is easily fixed by checking for ov...
1
int git_delta_apply( void **out, size_t *out_len, const unsigned char *base, size_t base_len, const unsigned char *delta, size_t delta_len) { const unsigned char *delta_end = delta + delta_len; size_t base_sz, res_sz, alloc_sz; unsigned char *res_dp; *out = NULL; *out_len = 0; /* * Check that the base s...
228,984,589,945,149,840,000,000,000,000,000,000,000
delta.c
235,241,610,924,393,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10887
A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addre...
https://nvd.nist.gov/vuln/detail/CVE-2018-10887
3,718
ngiflib
cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e
https://github.com/miniupnp/ngiflib
https://github.com/miniupnp/ngiflib/commit/cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e
fix "pixel overrun" fixes #3
1
static int DecodeGifImg(struct ngiflib_img * i) { struct ngiflib_decode_context context; long npix; u8 * stackp; u8 * stack_top; u16 clr; u16 eof; u16 free; u16 act_code = 0; u16 old_code = 0; u16 read_byt; u16 ab_prfx[4096]; u8 ab_suffx[4096]; u8 ab_stack[4096]; u8 flags; u8 casspecial = 0; if(!i) ret...
208,688,875,586,295,620,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-10717
The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 does not consider the bounds of the pixels data structure, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file, a differen...
https://nvd.nist.gov/vuln/detail/CVE-2018-10717
3,719
ngiflib
b588a2249c7abbfc52173e32ee11d6facef82f89
https://github.com/miniupnp/ngiflib
https://github.com/miniupnp/ngiflib/commit/b588a2249c7abbfc52173e32ee11d6facef82f89
check GIF image position and dimensions fixes #1
1
static int DecodeGifImg(struct ngiflib_img * i) { struct ngiflib_decode_context context; long npix; u8 * stackp; u8 * stack_top; u16 clr; u16 eof; u16 free; u16 act_code = 0; u16 old_code = 0; u16 read_byt; u16 ab_prfx[4096]; u8 ab_suffx[4096]; u8 ab_stack[4096]; u8 flags; u8 casspecial = 0; if(!i) ret...
284,105,126,342,844,770,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-10677
The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 lacks certain checks against width and height, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-10677
3,720
linux
73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
mm/mempolicy: fix use after free when calling get_mempolicy I hit a use after free issue when executing trinity and repoduced it with KASAN enabled. The related call trace is as follows. BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766 Read of size 2 by task syz-executor1/798 ...
1
static long do_get_mempolicy(int *policy, nodemask_t *nmask, unsigned long addr, unsigned long flags) { int err; struct mm_struct *mm = current->mm; struct vm_area_struct *vma = NULL; struct mempolicy *pol = current->mempolicy; if (flags & ~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED)) ...
152,269,556,434,917,930,000,000,000,000,000,000,000
mempolicy.c
25,852,424,809,621,314,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-10675
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
https://nvd.nist.gov/vuln/detail/CVE-2018-10675
3,721
file
a642587a9c9e2dd7feacdf513c3643ce26ad3c22
https://github.com/file/file
https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22
Avoid reading past the end of buffer (Rui Reis)
1
do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type, int swap, uint32_t namesz, uint32_t descsz, size_t noff, size_t doff, int *flags, size_t size, int clazz) { #ifdef ELFCORE int os_style = -1; /* * Sigh. The 2.0.36 kernel in Debian 2.1, at * least, doesn't correctly implement name *...
272,730,783,674,373,480,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-10360
The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-10360
3,722
mruby
b51b21fc63c9805862322551387d9036f2b63433
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433
Fix `use after free in File#initilialize_copy`; fix #4001 The bug and the fix were reported by https://hackerone.com/pnoltof
1
mrb_io_initialize_copy(mrb_state *mrb, mrb_value copy) { mrb_value orig; mrb_value buf; struct mrb_io *fptr_copy; struct mrb_io *fptr_orig; mrb_bool failed = TRUE; mrb_get_args(mrb, "o", &orig); fptr_copy = (struct mrb_io *)DATA_PTR(copy); if (fptr_copy != NULL) { fptr_finalize(mrb, fptr_copy...
150,634,863,447,224,430,000,000,000,000,000,000,000
io.c
41,201,053,483,208,995,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-10199
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2018-10199
3,723
mruby
1905091634a6a2925c911484434448e568330626
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/1905091634a6a2925c911484434448e568330626
Check length of env stack before accessing upvar; fix #3995
1
mrb_vm_exec(mrb_state *mrb, struct RProc *proc, mrb_code *pc) { /* mrb_assert(mrb_proc_cfunc_p(proc)) */ mrb_irep *irep = proc->body.irep; mrb_value *pool = irep->pool; mrb_sym *syms = irep->syms; mrb_code i; int ai = mrb_gc_arena_save(mrb); struct mrb_jmpbuf *prev_jmp = mrb->jmp; struct mrb_jmpbuf c_jm...
140,181,947,558,548,590,000,000,000,000,000,000,000
vm.c
252,079,256,979,517,780,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-10191
In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2018-10191
3,724
linux
4ea77014af0d6205b05503d1c7aac6eace11d473
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473
kernel/signal.c: avoid undefined behaviour in kill_something_info When running kill(72057458746458112, 0) in userspace I hit the following issue. UBSAN: Undefined behaviour in kernel/signal.c:1462:11 negation of -2147483648 cannot be represented in type 'int': CPU: 226 PID: 9849 Comm: test Tainted: G B ...
1
static int kill_something_info(int sig, struct siginfo *info, pid_t pid) { int ret; if (pid > 0) { rcu_read_lock(); ret = kill_pid_info(sig, info, find_vpid(pid)); rcu_read_unlock(); return ret; } read_lock(&tasklist_lock); if (pid != -1) { ret = __kill_pgrp_info(sig, info, pid ? find_vpid(-p...
233,236,629,790,152,600,000,000,000,000,000,000,000
signal.c
43,790,563,659,993,175,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-10124
The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.
https://nvd.nist.gov/vuln/detail/CVE-2018-10124
3,725
linux
9903e41ae1f5d50c93f268ca3304d4d7c64b9311
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9903e41ae1f5d50c93f268ca3304d4d7c64b9311
clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe() platform_get_resource() may return NULL, add proper check to avoid potential NULL dereferencing. This is detected by Coccinelle semantic patch. @@ expression pdev, res, n, t, e, e1, e2; @@ res = platform_get_resource(pdev, t, n); + if ...
1
static int hi3660_stub_clk_probe(struct platform_device *pdev) { struct device *dev = &pdev->dev; struct resource *res; unsigned int i; int ret; /* Use mailbox client without blocking */ stub_clk_chan.cl.dev = dev; stub_clk_chan.cl.tx_done = NULL; stub_clk_chan.cl.tx_block = false; stub_clk_chan.cl.knows_txdo...
198,852,483,878,198,200,000,000,000,000,000,000,000
clk-hi3660-stub.c
154,652,412,877,365,080,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-10074
The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval.
https://nvd.nist.gov/vuln/detail/CVE-2018-10074
3,729
mbedtls
740b218386083dc708ce98ccc94a63a95cd5629e
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/740b218386083dc708ce98ccc94a63a95cd5629e
Add bounds check before length read
1
static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl, unsigned char **p, unsigned char *end ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; size_t len; ((void) ssl); /* * PSK parameters: * * opaqu...
249,660,299,586,144,350,000,000,000,000,000,000,000
ssl_cli.c
312,635,158,393,935,170,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-9989
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9989
3,730
mbedtls
a1098f81c252b317ad34ea978aea2bc47760b215
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/a1098f81c252b317ad34ea978aea2bc47760b215
Add bounds check before signature length read
1
static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl ) { int ret; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; unsigned char *p = NULL, *end = NULL; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) ); #if defined(MBED...
126,675,777,471,818,340,000,000,000,000,000,000,000
ssl_cli.c
245,686,137,588,342,770,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-9988
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9988
3,731
openvpn
1394192b210cb3c6624a7419bcf3ff966742e79b
https://github.com/OpenVPN/openvpn
https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b
Fix potential double-free() in Interactive Service (CVE-2018-9336) Malformed input data on the service pipe towards the OpenVPN interactive service (normally used by the OpenVPN GUI to request openvpn instances from the service) can result in a double free() in the error handling code. This usually only leads to a pr...
1
GetStartupData(HANDLE pipe, STARTUP_DATA *sud) { size_t size, len; BOOL ret = FALSE; WCHAR *data = NULL; DWORD bytes, read; bytes = PeekNamedPipeAsync(pipe, 1, &exit_event); if (bytes == 0) { MsgToEventLog(M_SYSERR, TEXT("PeekNamedPipeAsync failed")); ReturnLastErro...
292,015,260,812,614,400,000,000,000,000,000,000,000
interactive.c
297,968,443,524,703,830,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-9336
openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privil...
https://nvd.nist.gov/vuln/detail/CVE-2018-9336
3,732
yubico-pam
0f6ceabab0a8849b47f67d727aa526c2656089ba
https://github.com/Yubico/yubico-pam
https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba
util: make sure to close the authfile before returning success fixes #136
1
check_user_token (const char *authfile, const char *username, const char *otp_id, int verbose, FILE *debug_file) { char buf[1024]; char *s_user, *s_token; int retval = AUTH_ERROR; int fd; struct stat st; FILE *opwfile; fd = open(authfile, O_RDONLY, 0); if (fd < 0) { ...
73,976,873,416,705,270,000,000,000,000,000,000,000
util.c
194,446,551,470,215,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-9275
In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors).
https://nvd.nist.gov/vuln/detail/CVE-2018-9275
3,733
openbsd
0654414afcce51a16d35d05060190a3ec4618d42
https://github.com/libressl-portable/openbsd
https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42
None
1
int_x509_param_set_hosts(X509_VERIFY_PARAM_ID *id, int mode, const char *name, size_t namelen) { char *copy; /* * Refuse names with embedded NUL bytes. * XXX: Do we need to push an error onto the error stack? */ if (name && memchr(name, '\0', namelen)) return 0; if (mode == SET_HOST && id->hosts...
281,204,162,380,877,240,000,000,000,000,000,000,000
None
null
[ "CWE-295" ]
CVE-2018-8970
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive informatio...
https://nvd.nist.gov/vuln/detail/CVE-2018-8970
3,734
linux
d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
x86/entry/64: Don't use IST entry for #BP stack There's nothing IST-worthy about #BP/int3. We don't allow kprobes in the small handful of places in the kernel that run at CPL0 with an invalid stack, and 32-bit kernels have used normal interrupt gates for #BP forever. Furthermore, we don't allow kprobes in places tha...
1
dotraplinkage void notrace do_int3(struct pt_regs *regs, long error_code) { #ifdef CONFIG_DYNAMIC_FTRACE /* * ftrace must be first, everything else may cause a recursive crash. * See note by declaration of modifying_ftrace_code in ftrace.c */ if (unlikely(atomic_read(&modifying_ftrace_code)) && ftrace_i...
106,804,786,307,522,770,000,000,000,000,000,000,000
traps.c
166,654,386,209,643,410,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2018-8897
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) pri...
https://nvd.nist.gov/vuln/detail/CVE-2018-8897
3,735
kamailio
e1d8008a09d9390ebaf698abe8909e10dfec4097
https://github.com/kamailio/kamailio
https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097
tmx: allocate space to store ending 0 for branch value - reported by Alfred Farrugia and Sandro Gauci
1
int tmx_check_pretran(sip_msg_t *msg) { unsigned int chid; unsigned int slotid; int dsize; struct via_param *vbr; str scallid; str scseqmet; str scseqnum; str sftag; str svbranch = {NULL, 0}; pretran_t *it; if(_tmx_ptran_table==NULL) { LM_ERR("pretran hash table not initialized yet\n"); return -1; } i...
133,412,845,150,430,060,000,000,000,000,000,000,000
tmx_pretran.c
50,705,933,634,594,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8828
A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x before 5.0.6, and 5.1.x before 5.1.2. A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_pretran function in modules/tmx/tmx_pretran.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-8828
3,746
FreeRDP
d1112c279bd1a327e8e4d0b5f371458bf2579659
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659
Fixed CVE-2018-8788 Thanks to Eyal Itkin from Check Point Software Technologies.
1
static void nsc_rle_decode(BYTE* in, BYTE* out, UINT32 originalSize) { UINT32 len; UINT32 left; BYTE value; left = originalSize; while (left > 4) { value = *in++; if (left == 5) { *out++ = value; left--; } else if (value == *in) { in++; if (*in < 0xFF) { len = (UINT32) *...
6,048,075,215,570,503,000,000,000,000,000,000,000
nsc.c
220,797,472,776,409,930,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-8788
FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-8788
3,752
FreeRDP
09b9d4f1994a674c4ec85b4947aa656eda1aed8a
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a
Fixed CVE-2018-8787 Thanks to Eyal Itkin from Check Point Software Technologies.
1
static BOOL gdi_Bitmap_Decompress(rdpContext* context, rdpBitmap* bitmap, const BYTE* pSrcData, UINT32 DstWidth, UINT32 DstHeight, UINT32 bpp, UINT32 length, BOOL compressed, UINT32 codecId) { UINT32 SrcSize = lengt...
8,582,638,630,962,748,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2018-8787
FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-8787
3,753
FreeRDP
445a5a42c500ceb80f8fa7f2c11f3682538033f3
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3
Fixed CVE-2018-8786 Thanks to Eyal Itkin from Check Point Software Technologies.
1
BITMAP_UPDATE* update_read_bitmap_update(rdpUpdate* update, wStream* s) { UINT32 i; BITMAP_UPDATE* bitmapUpdate = calloc(1, sizeof(BITMAP_UPDATE)); if (!bitmapUpdate) goto fail; if (Stream_GetRemainingLength(s) < 2) goto fail; Stream_Read_UINT16(s, bitmapUpdate->number); /* numberRectangles (2 bytes) */ WL...
282,936,062,818,017,570,000,000,000,000,000,000,000
update.c
243,677,407,853,847,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8786
FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-8786
3,754
FreeRDP
602f4a2e14b41703b5f431de3154cd46a5750a2d
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d
Fixed CVE-2018-8785 Thanks to Eyal Itkin from Check Point Software Technologies.
1
int zgfx_decompress(ZGFX_CONTEXT* zgfx, const BYTE* pSrcData, UINT32 SrcSize, BYTE** ppDstData, UINT32* pDstSize, UINT32 flags) { int status = -1; BYTE descriptor; wStream* stream = Stream_New((BYTE*)pSrcData, SrcSize); if (!stream) return -1; if (Stream_GetRemainingLength(stream) < 1...
318,980,867,436,274,160,000,000,000,000,000,000,000
zgfx.c
283,567,047,878,855,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8785
FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-8785
3,757
FreeRDP
17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7
Fixed CVE-2018-8784 Thanks to Eyal Itkin from Check Point Software Technologies.
1
static BOOL zgfx_decompress_segment(ZGFX_CONTEXT* zgfx, wStream* stream, size_t segmentSize) { BYTE c; BYTE flags; UINT32 extra = 0; int opIndex; int haveBits; int inPrefix; UINT32 count; UINT32 distance; BYTE* pbSegment; size_t cbSegment = segmentSize - 1; if ((Stream_GetRemainingLength(stream) < segme...
48,551,217,187,937,530,000,000,000,000,000,000,000
zgfx.c
146,200,484,448,513,670,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8784
FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-8784
3,759
libgit2
3207ddb0103543da8ad2139ec6539f590f9900c1
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/3207ddb0103543da8ad2139ec6539f590f9900c1
index: fix out-of-bounds read with invalid index entry prefix length The index format in version 4 has prefix-compressed entries, where every index entry can compress its path by using a path prefix of the previous entry. Since implmenting support for this index format version in commit 5625d86b9 (index: support index...
1
static int read_entry( git_index_entry **out, size_t *out_size, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->version >= INDEX_VERSION_NUMBE...
197,322,156,807,941,720,000,000,000,000,000,000,000
index.c
3,627,655,496,182,682,700,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-8098
Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8098
3,760
linux
0ddcff49b672239dda94d70d0fcf50317a9f4b51
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0ddcff49b672239dda94d70d0fcf50317a9f4b51
mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl() 'hwname' is malloced in hwsim_new_radio_nl() and should be freed before leaving from the error handling cases, otherwise it will cause memory leak. Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length") Signed-off-by: Wei Yongjun <we...
1
static int hwsim_new_radio_nl(struct sk_buff *msg, struct genl_info *info) { struct hwsim_new_radio_params param = { 0 }; const char *hwname = NULL; int ret; param.reg_strict = info->attrs[HWSIM_ATTR_REG_STRICT_REG]; param.p2p_device = info->attrs[HWSIM_ATTR_SUPPORT_P2P_DEVICE]; param.channels = channels; param...
260,520,256,202,264,520,000,000,000,000,000,000,000
mac80211_hwsim.c
75,874,823,711,895,600,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-8087
Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.
https://nvd.nist.gov/vuln/detail/CVE-2018-8087
3,761
linux
297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe() platform_get_resource() may fail and return NULL, so we should better check it's return value to avoid a NULL pointer dereference a bit later in the code. This is detected by Coccinelle semantic patch. @@ expression pdev, res, n, t, e, ...
1
static int unimac_mdio_probe(struct platform_device *pdev) { struct unimac_mdio_pdata *pdata = pdev->dev.platform_data; struct unimac_mdio_priv *priv; struct device_node *np; struct mii_bus *bus; struct resource *r; int ret; np = pdev->dev.of_node; priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL); ...
265,342,746,482,685,360,000,000,000,000,000,000,000
mdio-bcm-unimac.c
301,959,438,202,686,220,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-8043
The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).
https://nvd.nist.gov/vuln/detail/CVE-2018-8043
3,762
libvips
20d840e6da15c1574b3ed998bc92f91d1e36c2a5
https://github.com/libvips/libvips
https://github.com/jcupitt/libvips/commit/20d840e6da15c1574b3ed998bc92f91d1e36c2a5
fix a crash with delayed load If a delayed load failed, it could leave the pipeline only half-set up. Sebsequent threads could then segv. Set a load-has-failed flag and test before generate. See https://github.com/jcupitt/libvips/issues/893
1
vips_foreign_load_start( VipsImage *out, void *a, void *b ) { VipsForeignLoad *load = VIPS_FOREIGN_LOAD( b ); VipsForeignLoadClass *class = VIPS_FOREIGN_LOAD_GET_CLASS( load ); if( !load->real ) { if( !(load->real = vips_foreign_load_temp( load )) ) return( NULL ); #ifdef DEBUG printf( "vips_foreign_l...
279,924,439,095,021,870,000,000,000,000,000,000,000
foreign.c
110,778,714,136,646,050,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2018-7998
In libvips before 8.6.3, a NULL function pointer dereference vulnerability was found in the vips_region_generate function in region.c, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted image file. This occurs because of a race condition involving a failed...
https://nvd.nist.gov/vuln/detail/CVE-2018-7998
3,763
linux
4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
scsi: libsas: fix memory leak in sas_smp_get_phy_events() We've got a memory leak with the following producer: while true; do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null; done The buffer req is allocated and not freed after we return. Fix it. Fixes: 2908d778ab3e ("[SCSI] aic94xx: new driver") S...
1
int sas_smp_get_phy_events(struct sas_phy *phy) { int res; u8 *req; u8 *resp; struct sas_rphy *rphy = dev_to_rphy(phy->dev.parent); struct domain_device *dev = sas_find_dev_by_rphy(rphy); req = alloc_smp_req(RPEL_REQ_SIZE); if (!req) return -ENOMEM; resp = alloc_smp_resp(RPEL_RESP_SIZE); if (!resp) { kfr...
239,534,202,847,056,830,000,000,000,000,000,000,000
sas_expander.c
20,389,702,074,033,690,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-7757
Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/inval...
https://nvd.nist.gov/vuln/detail/CVE-2018-7757
3,764
openjpeg
6d8c0c06ee32dc03ba80acd48334e98728e56cf5
https://github.com/uclouvain/openjpeg
https://github.com/kbabioch/openjpeg/commit/6d8c0c06ee32dc03ba80acd48334e98728e56cf5
None
1
int main(int argc, char *argv[]) { opj_dinfo_t* dinfo; opj_event_mgr_t event_mgr; /* event manager */ int tnum; unsigned int snum; opj_mj2_t *movie; mj2_tk_t *track; mj2_sample_t *sample; unsigned char* frame_codestream; FILE *file, *outfile; char outfilename[50]; mj2_dp...
271,909,071,981,036,530,000,000,000,000,000,000,000
opj_mj2_extract.c
253,856,647,793,899,200,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7648
An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
https://nvd.nist.gov/vuln/detail/CVE-2018-7648
3,765
linux
f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
rds: Fix NULL pointer dereference in __rds_rdma_map This is a fix for syzkaller719569, where memory registration was attempted without any underlying transport being loaded. Analysis of the case reveals that it is the setsockopt() RDS_GET_MR (2) and RDS_GET_MR_FOR_DEST (7) that are vulnerable. Here is an example sta...
1
static int __rds_rdma_map(struct rds_sock *rs, struct rds_get_mr_args *args, u64 *cookie_ret, struct rds_mr **mr_ret) { struct rds_mr *mr = NULL, *found; unsigned int nr_pages; struct page **pages = NULL; struct scatterlist *sg; void *trans_private; unsigned long flags; rds_rdma_cookie_t cookie; unsigned in...
227,718,939,197,316,780,000,000,000,000,000,000,000
rdma.c
290,702,579,713,901,130,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7492
A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
https://nvd.nist.gov/vuln/detail/CVE-2018-7492
3,772
unixODBC
45ef78e037f578b15fc58938a3a3251655e71d6f
https://github.com/lurcher/unixODBC
https://github.com/lurcher/unixODBC/commit/45ef78e037f578b15fc58938a3a3251655e71d6f#diff-d52750c7ba4e594410438569d8e2963aL24
New Pre Source
1
BOOL SQLWriteFileDSN( LPCSTR pszFileName, LPCSTR pszAppName, LPCSTR pszKeyName, LPCSTR pszString ) { HINI hIni; char szFileName[ODBC_FILENAME_MAX+1]; if ( pszFileName[0] == '/' ) { strncpy( szFileName, sizeof(szFileName) - 5, pszFileName ); } else { char szPath[ODBC_FILENAME...
179,664,217,812,201,060,000,000,000,000,000,000,000
SQLWriteFileDSN.c
157,150,626,156,817,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7485
The SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c in unixODBC 2.3.5 has strncpy arguments in the wrong order, which allows attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-7485
3,773
linux
9b54d816e00425c3a517514e0d677bb3cec49258
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9b54d816e00425c3a517514e0d677bb3cec49258
blkcg: fix double free of new_blkg in blkcg_init_queue If blkg_create fails, new_blkg passed as an argument will be freed by blkg_create, so there is no need to free it again. Signed-off-by: Hou Tao <houtao1@huawei.com> Signed-off-by: Jens Axboe <axboe@fb.com>
1
int blkcg_init_queue(struct request_queue *q) { struct blkcg_gq *new_blkg, *blkg; bool preloaded; int ret; new_blkg = blkg_alloc(&blkcg_root, q, GFP_KERNEL); if (!new_blkg) return -ENOMEM; preloaded = !radix_tree_preload(GFP_KERNEL); /* * Make sure the root blkg exists and count the existing blkgs. As ...
94,022,243,707,851,460,000,000,000,000,000,000,000
blk-cgroup.c
11,694,601,837,132,450,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-7480
The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-7480
3,774
leptonica
c1079bb8e77cdd426759e466729917ca37a3ed9f
https://github.com/DanBloomberg/leptonica
https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f
prog/htmlviewer: Catch unbound memory access (CID 1386222) rootname can have any size, so limit the amount of copied bytes. Signed-off-by: Stefan Weil <sw@weilnetz.de>
1
pixHtmlViewer(const char *dirin, const char *dirout, const char *rootname, l_int32 thumbwidth, l_int32 viewwidth) { char *fname, *fullname, *outname; char *mainname, *linkname, *linknameshort; char *viewfile, *thumbfile; char *shtm...
91,775,814,159,057,430,000,000,000,000,000,000,000
htmlviewer.c
175,672,854,193,627,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7247
An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-7247
3,779
leptonica
ee301cb2029db8a6289c5295daa42bba7715e99a
https://github.com/DanBloomberg/leptonica
https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a
Security fixes: expect final changes for release 1.75.3. * Fixed a debian security issue with fscanf() reading a string with possible buffer overflow. * There were also a few similar situations with sscanf().
1
gplotRead(const char *filename) { char buf[L_BUF_SIZE]; char *rootname, *title, *xlabel, *ylabel, *ignores; l_int32 outformat, ret, version, ignore; FILE *fp; GPLOT *gplot; PROCNAME("gplotRead"); if (!filename) return (GPLOT *)ERROR_PTR("filename not defined", procName, NULL); ...
92,835,320,699,013,360,000,000,000,000,000,000,000
gplot.c
223,723,602,336,187,550,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7186
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
https://nvd.nist.gov/vuln/detail/CVE-2018-7186
3,780
leptonica
ee301cb2029db8a6289c5295daa42bba7715e99a
https://github.com/DanBloomberg/leptonica
https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a
Security fixes: expect final changes for release 1.75.3. * Fixed a debian security issue with fscanf() reading a string with possible buffer overflow. * There were also a few similar situations with sscanf().
1
ptaReadStream(FILE *fp) { char typestr[128]; l_int32 i, n, ix, iy, type, version; l_float32 x, y; PTA *pta; PROCNAME("ptaReadStream"); if (!fp) return (PTA *)ERROR_PTR("stream not defined", procName, NULL); if (fscanf(fp, "\n Pta Version %d\n", &version) != 1) retur...
30,001,997,675,172,210,000,000,000,000,000,000,000
ptabasic.c
4,753,893,045,332,788,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7186
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
https://nvd.nist.gov/vuln/detail/CVE-2018-7186
3,783
linux
fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
futex: Prevent overflow by strengthen input validation UBSAN reports signed integer overflow in kernel/futex.c: UBSAN: Undefined behaviour in kernel/futex.c:2041:18 signed integer overflow: 0 - -2147483648 cannot be represented in type 'int' Add a sanity check to catch negative values of nr_wake and nr_requeue. ...
1
static int futex_requeue(u32 __user *uaddr1, unsigned int flags, u32 __user *uaddr2, int nr_wake, int nr_requeue, u32 *cmpval, int requeue_pi) { union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT; int drop_count = 0, task_count = 0, ret; struct futex_pi_state *pi_state = NULL; struct futex_hash_bu...
199,927,163,848,810,380,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2018-6927
The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
https://nvd.nist.gov/vuln/detail/CVE-2018-6927
3,784
suricata
e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
stream: still inspect packets dropped by stream The detect engine would bypass packets that are set as dropped. This seems sane, as these packets are going to be dropped anyway. However, it lead to the following corner case: stream events that triggered the drop could not be matched on the rules. The packet with the ...
1
static void DetectFlow(ThreadVars *tv, DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx, Packet *p) { /* No need to perform any detection on this packet, if the the given flag is set.*/ if ((p->flags & PKT_NOPACKET_INSPECTION) || (PACKET_TEST_ACTIO...
195,957,054,812,264,830,000,000,000,000,000,000,000
detect.c
153,350,231,578,102,060,000,000,000,000,000,000,000
[ "CWE-693" ]
CVE-2018-6794
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utili...
https://nvd.nist.gov/vuln/detail/CVE-2018-6794
3,785
suricata
e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
stream: still inspect packets dropped by stream The detect engine would bypass packets that are set as dropped. This seems sane, as these packets are going to be dropped anyway. However, it lead to the following corner case: stream events that triggered the drop could not be matched on the rules. The packet with the ...
1
int StreamTcpPacket (ThreadVars *tv, Packet *p, StreamTcpThread *stt, PacketQueue *pq) { SCEnter(); DEBUG_ASSERT_FLOW_LOCKED(p->flow); SCLogDebug("p->pcap_cnt %"PRIu64, p->pcap_cnt); /* assign the thread id to the flow */ if (unlikely(p->flow->thread_id == 0)) { p->fl...
197,454,659,043,875,700,000,000,000,000,000,000,000
stream-tcp.c
1,301,724,529,142,096,000,000,000,000,000,000,000
[ "CWE-693" ]
CVE-2018-6794
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utili...
https://nvd.nist.gov/vuln/detail/CVE-2018-6794
3,786
WavPack
d5bf76b5a88d044a1be1d5656698e3ba737167e5
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5
issue #27, do not overwrite stack on corrupt RF64 file
1
int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0; int64_t total_samples = 0, infilesize; RiffChunkHeader riff_chunk_header; ChunkHeader chunk_header; WaveHeader WaveHeader; ...
266,946,299,595,107,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-6767
A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
https://nvd.nist.gov/vuln/detail/CVE-2018-6767
3,787
uncurl
448cd13e7b18c83855d706c564341ddd1e38e769
https://github.com/chrisd1100/uncurl
https://github.com/chrisd1100/uncurl/commit/448cd13e7b18c83855d706c564341ddd1e38e769
None
1
UNCURL_EXPORT int32_t uncurl_ws_accept(struct uncurl_conn *ucc, char **origins, int32_t n_origins) { int32_t e; e = uncurl_read_header(ucc); if (e != UNCURL_OK) return e; uncurl_set_header_str(ucc, "Upgrade", "websocket"); uncurl_set_header_str(ucc, "Connection", "Upgrade"); char *origin = NULL; e = uncurl_g...
185,832,743,048,029,200,000,000,000,000,000,000,000
None
null
[ "CWE-352" ]
CVE-2018-6651
In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim...
https://nvd.nist.gov/vuln/detail/CVE-2018-6651
3,790
w3m
7fdc83b0364005a0b5ed869230dd81752ba022e8
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8
Prevent invalid columnPos() call in formUpdateBuffer() Bug-Debian: https://github.com/tats/w3m/issues/89
1
formUpdateBuffer(Anchor *a, Buffer *buf, FormItemList *form) { Buffer save; char *p; int spos, epos, rows, c_rows, pos, col = 0; Line *l; copyBuffer(&save, buf); gotoLine(buf, a->start.line); switch (form->type) { case FORM_TEXTAREA: case FORM_INPUT_TEXT: case FORM_INPUT_FILE: ...
90,699,627,261,407,880,000,000,000,000,000,000,000
form.c
290,331,077,565,996,070,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-6197
w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-6197
3,791
w3m
8354763b90490d4105695df52674d0fcef823e92
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/8354763b90490d4105695df52674d0fcef823e92
Prevent negative indent value in feed_table_block_tag() Bug-Debian: https://github.com/tats/w3m/issues/88
1
feed_table_block_tag(struct table *tbl, char *line, struct table_mode *mode, int indent, int cmd) { int offset; if (mode->indent_level <= 0 && indent == -1) return; if (mode->indent_level >= CHAR_MAX && indent == 1) return; setwidth(tbl, mode); feed_table_inline_tag(tbl, line, mode, -1); ...
95,430,748,719,998,940,000,000,000,000,000,000,000
table.c
48,265,608,758,374,150,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-6196
w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value.
https://nvd.nist.gov/vuln/detail/CVE-2018-6196
3,792
linux
073c516ff73557a8f7315066856c04b50383ac34
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/073c516ff73557a8f7315066856c04b50383ac34
nsfs: mark dentry with DCACHE_RCUACCESS Andrey reported a use-after-free in __ns_get_path(): spin_lock include/linux/spinlock.h:299 [inline] lockref_get_not_dead+0x19/0x80 lib/lockref.c:179 __ns_get_path+0x197/0x860 fs/nsfs.c:66 open_related_ns+0xda/0x200 fs/nsfs.c:143 sock_ioctl+0x39d/0x440 net/socket.c:10...
1
static void *__ns_get_path(struct path *path, struct ns_common *ns) { struct vfsmount *mnt = nsfs_mnt; struct qstr qname = { .name = "", }; struct dentry *dentry; struct inode *inode; unsigned long d; rcu_read_lock(); d = atomic_long_read(&ns->stashed); if (!d) goto slow; dentry = (struct dentry *)d; if (!...
283,164,269,815,372,800,000,000,000,000,000,000,000
nsfs.c
255,868,983,414,598,720,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-5873
An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. Due to a race condition when accessing files, a Use After Free condition can occur. This also affects all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before securit...
https://nvd.nist.gov/vuln/detail/CVE-2018-5873
3,795
linux
ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
loop: fix concurrent lo_open/lo_release 范龙飞 reports that KASAN can report a use-after-free in __lock_acquire. The reason is due to insufficient serialization in lo_release(), which will continue to use the loop device even after it has decremented the lo_refcnt to zero. In the meantime, another process can come in, o...
1
static void lo_release(struct gendisk *disk, fmode_t mode) { struct loop_device *lo = disk->private_data; int err; if (atomic_dec_return(&lo->lo_refcnt)) return; mutex_lock(&lo->lo_ctl_mutex); if (lo->lo_flags & LO_FLAGS_AUTOCLEAR) { /* * In autoclear mode, stop the loop thread * and remove configu...
92,709,335,376,815,670,000,000,000,000,000,000,000
loop.c
15,664,066,985,517,498,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-5344
In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-5344
3,796
linux
c1fa0768a8713b135848f78fd43ffc208d8ded70
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c1fa0768a8713b135848f78fd43ffc208d8ded70
powerpc/tm: Flush TM only if CPU has TM feature Commit cd63f3c ("powerpc/tm: Fix saving of TM SPRs in core dump") added code to access TM SPRs in flush_tmregs_to_thread(). However flush_tmregs_to_thread() does not check if TM feature is available on CPU before trying to access TM SPRs in order to copy live state to th...
1
static void flush_tmregs_to_thread(struct task_struct *tsk) { /* * If task is not current, it will have been flushed already to * it's thread_struct during __switch_to(). * * A reclaim flushes ALL the state or if not in TM save TM SPRs * in the appropriate thread structures from live. */ if (tsk != cu...
117,879,822,457,848,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-1091
In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the co...
https://nvd.nist.gov/vuln/detail/CVE-2018-1091
3,802
linux
57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
netfilter: add back stackpointer size checks The rationale for removing the check is only correct for rulesets generated by ip(6)tables. In iptables, a jump can only occur to a user-defined chain, i.e. because we size the stack based on number of user-defined chains we cannot exceed stack size. However, the underlyi...
1
ipt_do_table(struct sk_buff *skb, const struct nf_hook_state *state, struct xt_table *table) { unsigned int hook = state->hook; static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long)))); const struct iphdr *ip; /* Initializing verdict to NF_DROP keeps gcc happy. */ unsigned int ver...
317,586,211,130,688,100,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-1065
The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/i...
https://nvd.nist.gov/vuln/detail/CVE-2018-1065
3,803
curl
ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628
https://github.com/curl/curl
https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628
smtp: use the upload buffer size for scratch buffer malloc ... not the read buffer size, as that can be set smaller and thus cause a buffer overflow! CVE-2018-0500 Reported-by: Peter Wu Bug: https://curl.haxx.se/docs/adv_2018-70a2.html
1
CURLcode Curl_smtp_escape_eob(struct connectdata *conn, const ssize_t nread) { /* When sending a SMTP payload we must detect CRLF. sequences making sure they are sent as CRLF.. instead, as a . on the beginning of a line will be deleted by the server when not part of an EOB terminator and a genuine CRLF...
170,694,906,334,543,880,000,000,000,000,000,000,000
smtp.c
285,403,495,559,952,680,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-0500
Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
https://nvd.nist.gov/vuln/detail/CVE-2018-0500
3,805
miniupnp
7aeb624b44f86d335841242ff427433190e7168a
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/7aeb624b44f86d335841242ff427433190e7168a
properly initialize data structure for SOAP parsing in ParseNameValue() topelt field was not properly initialized. should fix #268
1
ParseNameValue(const char * buffer, int bufsize, struct NameValueParserData * data) { struct xmlparser parser; data->l_head = NULL; data->portListing = NULL; data->portListingLength = 0; /* init xmlparser object */ parser.xmlstart = buffer; parser.xmlsize = bufsize; parser.data = data; par...
18,049,727,750,159,877,000,000,000,000,000,000,000
upnpreplyparse.c
41,172,885,683,690,726,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-1000494
Uninitialized stack variable vulnerability in NameValueParserEndElt (upnpreplyparse.c) in miniupnpd < 2.0 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact
https://nvd.nist.gov/vuln/detail/CVE-2017-1000494
3,806
wildmidi
814f31d8eceda8401eb812fc2e94ed143fdad0ab
https://github.com/Mindwerks/wildmidi
https://github.com/Mindwerks/wildmidi/commit/814f31d8eceda8401eb812fc2e94ed143fdad0ab
wildmidi_lib.c (WildMidi_Open, WildMidi_OpenBuffer): refuse to proceed if less then 18 bytes of input Fixes bug #178.
1
WM_SYMBOL midi *WildMidi_Open(const char *midifile) { uint8_t *mididata = NULL; uint32_t midisize = 0; uint8_t mus_hdr[] = { 'M', 'U', 'S', 0x1A }; uint8_t xmi_hdr[] = { 'F', 'O', 'R', 'M' }; midi * ret = NULL; if (!WM_Initialized) { _WM_GLOBAL_ERROR(__FUNCTION__, __LINE__, WM_ERR_NOT_I...
49,238,147,717,637,630,000,000,000,000,000,000,000
wildmidi_lib.c
287,548,982,026,805,930,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-1000418
The WildMidi_Open function in WildMIDI since commit d8a466829c67cacbb1700beded25c448d99514e5 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000418
3,814
linux
b86e33075ed1909d8002745b56ecf73b833db143
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b86e33075ed1909d8002745b56ecf73b833db143
f2fs: fix a dead loop in f2fs_fiemap() A dead loop can be triggered in f2fs_fiemap() using the test case as below: ... fd = open(); fallocate(fd, 0, 0, 4294967296); ioctl(fd, FS_IOC_FIEMAP, fiemap_buf); ... It's caused by an overflow in __get_data_block(): ... bh->b_size = map.m_len << inode->i_blkbits; ... ...
1
static int __get_data_block(struct inode *inode, sector_t iblock, struct buffer_head *bh, int create, int flag, pgoff_t *next_pgofs) { struct f2fs_map_blocks map; int err; map.m_lblk = iblock; map.m_len = bh->b_size >> inode->i_blkbits; map.m_next_pgofs = next_pgofs; err = f2fs_map_blocks(inode, &map, cre...
36,840,277,564,373,170,000,000,000,000,000,000,000
data.c
145,455,815,818,505,820,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-18257
The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.
https://nvd.nist.gov/vuln/detail/CVE-2017-18257
3,815
linux
1572e45a924f254d9570093abde46430c3172e3d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1572e45a924f254d9570093abde46430c3172e3d
perf/core: Fix the perf_cpu_time_max_percent check Use "proc_dointvec_minmax" instead of "proc_dointvec" to check the input value from user-space. If not, we can set a big value and some vars will overflow like "sysctl_perf_event_sample_rate" which will cause a lot of unexpected problems. Signed-off-by: Tan Xiaojun ...
1
int perf_cpu_time_max_percent_handler(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) { int ret = proc_dointvec(table, write, buffer, lenp, ppos); if (ret || !write) return ret; if (sysctl_perf_cpu_time_max_percent == 100 || sysctl_perf_cpu_time_max_percent...
108,483,018,357,036,800,000,000,000,000,000,000,000
core.c
304,500,610,601,399,240,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-18255
The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.
https://nvd.nist.gov/vuln/detail/CVE-2017-18255
3,816
linux
30a61ddf8117c26ac5b295e1233eaa9629a94ca3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3
f2fs: fix race condition in between free nid allocator/initializer In below concurrent case, allocated nid can be loaded into free nid cache and be allocated again. Thread A Thread B - f2fs_create - f2fs_new_inode - alloc_nid - __insert_nid_to_list(ALLOC_NID_LIST) - f2fs_balance_fs_bg - build_free...
1
static bool add_free_nid(struct f2fs_sb_info *sbi, nid_t nid, bool build) { struct f2fs_nm_info *nm_i = NM_I(sbi); struct free_nid *i; struct nat_entry *ne; int err; /* 0 nid should not be used */ if (unlikely(nid == 0)) return false; if (build) { /* do not add allocated nids */ ne = __lookup_na...
84,542,765,132,488,550,000,000,000,000,000,000,000
node.c
42,220,681,768,883,035,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2017-18249
The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.
https://nvd.nist.gov/vuln/detail/CVE-2017-18249
3,817
cups
49fa4983f25b64ec29d548ffa3b9782426007df3
https://github.com/apple/cups
https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3
DBUS notifications could crash the scheduler (Issue #5143) - scheduler/ipp.c: Make sure requesting-user-name string is valid UTF-8.
1
add_job(cupsd_client_t *con, /* I - Client connection */ cupsd_printer_t *printer, /* I - Destination printer */ mime_type_t *filetype) /* I - First print file type, if any */ { http_status_t status; /* Policy status */ ipp_attribute_t *attr, /* Current attribute */ *auth_info; /* auth-info attribute ...
143,641,121,189,248,620,000,000,000,000,000,000,000
ipp.c
103,444,657,439,025,130,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-18248
The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.
https://nvd.nist.gov/vuln/detail/CVE-2017-18248
3,837
linux
70feee0e1ef331b22cc51f383d532a0d043fbdcc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/70feee0e1ef331b22cc51f383d532a0d043fbdcc
mlock: fix mlock count can not decrease in race condition Kefeng reported that when running the follow test, the mlock count in meminfo will increase permanently: [1] testcase linux:~ # cat test_mlockal grep Mlocked /proc/meminfo for j in `seq 0 10` do for i in `seq 4 15` do ./p_mlockall >> log & done...
1
static void __munlock_pagevec(struct pagevec *pvec, struct zone *zone) { int i; int nr = pagevec_count(pvec); int delta_munlocked; struct pagevec pvec_putback; int pgrescued = 0; pagevec_init(&pvec_putback, 0); /* Phase 1: page isolation */ spin_lock_irq(zone_lru_lock(zone)); for (i = 0; i < nr; i++) {...
115,707,399,857,902,040,000,000,000,000,000,000,000
mlock.c
124,452,116,569,757,200,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-18221
The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls.
https://nvd.nist.gov/vuln/detail/CVE-2017-18221
3,838
linux
27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
net: hns: Fix a skb used after free bug skb maybe freed in hns_nic_net_xmit_hw() and return NETDEV_TX_OK, which cause hns_nic_net_xmit to use a freed skb. BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x62c/0x940... [17659.112635] alloc_debug_processing+0x18c/0x1a0 [17659.117208] __slab_alloc+0x52c/0x...
1
static netdev_tx_t hns_nic_net_xmit(struct sk_buff *skb, struct net_device *ndev) { struct hns_nic_priv *priv = netdev_priv(ndev); int ret; assert(skb->queue_mapping < ndev->ae_handle->q_num); ret = hns_nic_net_xmit_hw(ndev, skb, &tx_ring_data(priv, skb->queue_mapping)); if (ret == NETDEV_TX_OK...
286,205,539,332,141,500,000,000,000,000,000,000,000
hns_enet.c
118,232,006,227,961,090,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-18218
In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.
https://nvd.nist.gov/vuln/detail/CVE-2017-18218
3,839
linux
27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
net: hns: Fix a skb used after free bug skb maybe freed in hns_nic_net_xmit_hw() and return NETDEV_TX_OK, which cause hns_nic_net_xmit to use a freed skb. BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x62c/0x940... [17659.112635] alloc_debug_processing+0x18c/0x1a0 [17659.117208] __slab_alloc+0x52c/0x...
1
int hns_nic_net_xmit_hw(struct net_device *ndev, struct sk_buff *skb, struct hns_nic_ring_data *ring_data) { struct hns_nic_priv *priv = netdev_priv(ndev); struct hnae_ring *ring = ring_data->ring; struct device *dev = ring_to_dev(ring); struct netdev_queue *dev_queue; struct skb_frag_struct *frag; int b...
111,953,708,316,717,710,000,000,000,000,000,000,000
hns_enet.c
118,232,006,227,961,090,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-18218
In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.
https://nvd.nist.gov/vuln/detail/CVE-2017-18218
3,843
linux
6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
mm/madvise.c: fix madvise() infinite loop under special circumstances MADVISE_WILLNEED has always been a noop for DAX (formerly XIP) mappings. Unfortunately madvise_willneed() doesn't communicate this information properly to the generic madvise syscall implementation. The calling convention is quite subtle there. ma...
1
static long madvise_willneed(struct vm_area_struct *vma, struct vm_area_struct **prev, unsigned long start, unsigned long end) { struct file *file = vma->vm_file; #ifdef CONFIG_SWAP if (!file) { *prev = vma; force_swapin_readahead(vma, start, end); return 0; } if (shmem_mapping(fil...
171,648,586,462,786,750,000,000,000,000,000,000,000
madvise.c
200,513,704,618,787,880,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
https://nvd.nist.gov/vuln/detail/CVE-2017-18208
3,844
linux
28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
ocfs2: should wait dio before inode lock in ocfs2_setattr() we should wait dio requests to finish before inode lock in ocfs2_setattr(), otherwise the following deadlock will happen: process 1 process 2 process 3 truncate file 'A' end_io of writing file 'A' receiving the ...
1
int ocfs2_setattr(struct dentry *dentry, struct iattr *attr) { int status = 0, size_change; int inode_locked = 0; struct inode *inode = d_inode(dentry); struct super_block *sb = inode->i_sb; struct ocfs2_super *osb = OCFS2_SB(sb); struct buffer_head *bh = NULL; handle_t *handle = NULL; struct dquot *transfer_to...
12,293,169,081,478,398,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2017-18204
The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.
https://nvd.nist.gov/vuln/detail/CVE-2017-18204
3,845
linux
b9a41d21dceadf8104812626ef85dc56ee8a60ed
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed
dm: fix race between dm_get_from_kobject() and __dm_destroy() The following BUG_ON was hit when testing repeat creation and removal of DM devices: kernel BUG at drivers/md/dm.c:2919! CPU: 7 PID: 750 Comm: systemd-udevd Not tainted 4.1.44 Call Trace: [<ffffffff81649e8b>] dm_get_from_kobject+0x34/0x3a ...
1
struct mapped_device *dm_get_from_kobject(struct kobject *kobj) { struct mapped_device *md; md = container_of(kobj, struct mapped_device, kobj_holder.kobj); if (test_bit(DMF_FREEING, &md->flags) || dm_deleting_md(md)) return NULL; dm_get(md); return md; }
232,285,841,910,144,100,000,000,000,000,000,000,000
dm.c
56,799,825,473,684,530,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2017-18203
The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.
https://nvd.nist.gov/vuln/detail/CVE-2017-18203
3,847
linux
638164a2718f337ea224b747cf5977ef143166a4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/638164a2718f337ea224b747cf5977ef143166a4
f2fs: fix potential panic during fstrim As Ju Hyung Park reported: "When 'fstrim' is called for manual trim, a BUG() can be triggered randomly with this patch. I'm seeing this issue on both x86 Desktop and arm64 Android phone. On x86 Desktop, this was caused during Ubuntu boot-up. I have a cronjob installed which c...
1
void f2fs_wait_discard_bios(struct f2fs_sb_info *sbi) { __issue_discard_cmd(sbi, false); __drop_discard_cmd(sbi); __wait_discard_cmd(sbi, false); }
66,587,864,384,024,680,000,000,000,000,000,000,000
segment.c
277,647,022,130,075,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-18200
The f2fs implementation in the Linux kernel before 4.14 mishandles reference counts associated with f2fs_wait_discard_bios calls, which allows local users to cause a denial of service (BUG), as demonstrated by fstrim.
https://nvd.nist.gov/vuln/detail/CVE-2017-18200
3,849
linux
dad48e73127ba10279ea33e6dbc8d3905c4d31c0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dad48e73127ba10279ea33e6dbc8d3905c4d31c0
f2fs: fix a bug caused by NULL extent tree Thread A: Thread B: -f2fs_remount -sbi->mount_opt.opt = 0; <--- -f2fs_iget -do_read_inode -f2fs_init_extent_tree -F2FS_I(inode)->extent_tree is NULL -default_options && parse_options -remount return ...
1
bool f2fs_init_extent_tree(struct inode *inode, struct f2fs_extent *i_ext) { struct f2fs_sb_info *sbi = F2FS_I_SB(inode); struct extent_tree *et; struct extent_node *en; struct extent_info ei; if (!f2fs_may_extent_tree(inode)) { /* drop largest extent */ if (i_ext && i_ext->len) { i_ext->len = 0; ret...
144,565,331,810,619,090,000,000,000,000,000,000,000
extent_cache.c
121,324,559,268,227,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-18193
fs/f2fs/extent_cache.c in the Linux kernel before 4.13 mishandles extent trees, which allows local users to cause a denial of service (BUG) via an application with multiple threads.
https://nvd.nist.gov/vuln/detail/CVE-2017-18193
3,850
cups
afa80cb2b457bf8d64f775bed307588610476c41
https://github.com/apple/cups
https://github.com/apple/cups/commit/afa80cb2b457bf8d64f775bed307588610476c41
Don't treat "localhost.localdomain" as an allowed replacement for localhost, since it isn't.
1
valid_host(cupsd_client_t *con) /* I - Client connection */ { cupsd_alias_t *a; /* Current alias */ cupsd_netif_t *netif; /* Current network interface */ const char *end; /* End character */ char *ptr; /* Pointer into host value */ /* * Copy the Host: header for later use... */ strlcpy(con->...
159,854,871,526,072,820,000,000,000,000,000,000,000
client.c
181,717,129,039,375,560,000,000,000,000,000,000,000
[ "CWE-290" ]
CVE-2017-18190
A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS no...
https://nvd.nist.gov/vuln/detail/CVE-2017-18190
3,851
mbedtls
83c9f495ffe70c7dd280b41fdfd4881485a3bc28
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/83c9f495ffe70c7dd280b41fdfd4881485a3bc28
Prevent bounds check bypass through overflow in PSK identity parsing The check `if( *p + n > end )` in `ssl_parse_client_psk_identity` is unsafe because `*p + n` might overflow, thus bypassing the check. As `n` is a user-specified value up to 65K, this is relevant if the library happens to be located in the last 65K o...
1
static int ssl_parse_client_psk_identity( mbedtls_ssl_context *ssl, unsigned char **p, const unsigned char *end ) { int ret = 0; size_t n; if( ssl->conf->f_psk == NULL && ( ssl->conf->psk == NULL || ssl->conf->psk_identity == NULL || ssl->conf->ps...
246,504,953,524,229,660,000,000,000,000,000,000,000
ssl_srv.c
242,941,228,807,408,900,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-18187
In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18187
3,852
linux
8dca4a41f1ad65043a78c2338d9725f859c8d2c3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8dca4a41f1ad65043a78c2338d9725f859c8d2c3
pinctrl/amd: Drop pinctrl_unregister for devm_ registered device It's not necessary to unregister pin controller device registered with devm_pinctrl_register() and using pinctrl_unregister() leads to a double free. Fixes: 3bfd44306c65 ("pinctrl: amd: Add support for additional GPIO") Signed-off-by: Wei Yongjun <weiyo...
1
static int amd_gpio_remove(struct platform_device *pdev) { struct amd_gpio *gpio_dev; gpio_dev = platform_get_drvdata(pdev); gpiochip_remove(&gpio_dev->gc); pinctrl_unregister(gpio_dev->pctrl); return 0; }
100,344,955,333,259,860,000,000,000,000,000,000,000
pinctrl-amd.c
137,063,333,804,755,300,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18174
In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
https://nvd.nist.gov/vuln/detail/CVE-2017-18174
3,858
linux
2638fd0f92d4397884fd991d8f4925cb3f081901
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901
netfilter: xt_TCPMSS: add more sanity tests on tcph->doff Denys provided an awesome KASAN report pointing to an use after free in xt_TCPMSS I have provided three patches to fix this issue, either in xt_TCPMSS or in xt_tcpudp.c. It seems xt_TCPMSS patch has the smallest possible impact. Signed-off-by: Eric Dumazet <e...
1
tcpmss_mangle_packet(struct sk_buff *skb, const struct xt_action_param *par, unsigned int family, unsigned int tcphoff, unsigned int minlen) { const struct xt_tcpmss_info *info = par->targinfo; struct tcphdr *tcph; int len, tcp_hdrlen; unsigned int i; __be16 oldval; u16 newmss; u8 *op...
250,029,302,786,329,280,000,000,000,000,000,000,000
xt_TCPMSS.c
261,370,175,787,540,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-18017
The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
https://nvd.nist.gov/vuln/detail/CVE-2017-18017
3,859
linux
21b5944350052d2583e82dd59b19a9ba94a007f0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
net: Fix double free and memory corruption in get_net_ns_by_id() (I can trivially verify that that idr_remove in cleanup_net happens after the network namespace count has dropped to zero --EWB) Function get_net_ns_by_id() does not check for net::count after it has found a peer in netns_ids idr. It may dereference a...
1
struct net *get_net_ns_by_id(struct net *net, int id) { struct net *peer; if (id < 0) return NULL; rcu_read_lock(); spin_lock_bh(&net->nsid_lock); peer = idr_find(&net->netns_ids, id); if (peer) get_net(peer); spin_unlock_bh(&net->nsid_lock); rcu_read_unlock(); return peer; }
126,228,411,105,494,450,000,000,000,000,000,000,000
net_namespace.c
229,167,366,123,156,130,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-15129
A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. Th...
https://nvd.nist.gov/vuln/detail/CVE-2017-15129
3,860
linux
1e3921471354244f70fe268586ff94a97a6dd4df
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size This oops: kernel BUG at fs/hugetlbfs/inode.c:484! RIP: remove_inode_hugepages+0x3d0/0x410 Call Trace: hugetlbfs_setattr+0xd9/0x130 notify_change+0x292/0x410 do_truncate+0x65/0xa0 do_sys_ftruncate.constprop.3+0x11a/0x18...
1
int hugetlb_mcopy_atomic_pte(struct mm_struct *dst_mm, pte_t *dst_pte, struct vm_area_struct *dst_vma, unsigned long dst_addr, unsigned long src_addr, struct page **pagep) { int vm_shared = dst_vma->vm_flags & VM_SHARED; struct hstate *h = hstate_vma(dst_vma); pte_t _dst_pte;...
285,571,524,825,774,600,000,000,000,000,000,000,000
hugetlb.c
273,321,831,039,362,950,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-15128
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).
https://nvd.nist.gov/vuln/detail/CVE-2017-15128