idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
160,142 | mruby | 5c114c91d4ff31859fcd84cf8bf349b737b90d99 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 | Clear unused stack region that may refer freed objects; fix #3596 | 0 | mark_context_stack(mrb_state *mrb, struct mrb_context *c)
{
size_t i;
size_t e;
mrb_value nil;
if (c->stack == NULL) return;
e = c->stack - c->stbase;
if (c->ci) e += c->ci->nregs;
if (c->stbase + e > c->stend) e = c->stend - c->stbase;
for (i=0; i<e; i++) {
mrb_value v = c->stbase[i];
... | 154,425,572,356,271,340,000,000,000,000,000,000,000 | gc.c | 31,238,307,737,732,260,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9527 | The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9527 |
2,759 | radare2 | f85bc674b2a2256a364fe796351bc1971e106005 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f85bc674b2a2256a364fe796351bc1971e106005 | Fix #7698 - UAF in r_config_set when loading a dex | 1 | R_API RConfigNode* r_config_set(RConfig *cfg, const char *name, const char *value) {
RConfigNode *node = NULL;
char *ov = NULL;
ut64 oi;
if (!cfg || STRNULL (name)) {
return NULL;
}
node = r_config_node_get (cfg, name);
if (node) {
if (node->flags & CN_RO) {
eprintf ("(error: '%s' config key is read only)... | 266,006,440,521,677,500,000,000,000,000,000,000,000 | config.c | 257,283,705,418,955,800,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9520 | The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9520 |
160,143 | radare2 | f85bc674b2a2256a364fe796351bc1971e106005 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f85bc674b2a2256a364fe796351bc1971e106005 | Fix #7698 - UAF in r_config_set when loading a dex | 0 | R_API RConfigNode* r_config_set(RConfig *cfg, const char *name, const char *value) {
RConfigNode *node = NULL;
char *ov = NULL;
ut64 oi;
if (!cfg || STRNULL (name)) {
return NULL;
}
node = r_config_node_get (cfg, name);
if (node) {
if (node->flags & CN_RO) {
eprintf ("(error: '%s' config key is read only)... | 35,786,382,639,120,727,000,000,000,000,000,000,000 | config.c | 122,656,823,785,822,720,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9520 | The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9520 |
2,760 | ImageMagick | 01843366d6a7b96e22ad7bb67f3df7d9fd4d5d74 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/01843366d6a7b96e22ad7bb67f3df7d9fd4d5d74 | None | 1 | MagickExport Image *CloneImage(const Image *image,const size_t columns,
const size_t rows,const MagickBooleanType detach,ExceptionInfo *exception)
{
double
scale;
Image
*clone_image;
size_t
length;
/*
Clone the image.
*/
assert(image != (const Image *) NULL);
assert(image->signature =... | 30,295,949,585,114,532,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2017-9501 | In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9501 |
160,144 | ImageMagick | 01843366d6a7b96e22ad7bb67f3df7d9fd4d5d74 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/01843366d6a7b96e22ad7bb67f3df7d9fd4d5d74 | None | 0 | MagickExport Image *CloneImage(const Image *image,const size_t columns,
const size_t rows,const MagickBooleanType detach,ExceptionInfo *exception)
{
double
scale;
Image
*clone_image;
size_t
length;
/*
Clone the image.
*/
assert(image != (const Image *) NULL);
assert(image->signature =... | 319,077,031,827,083,200,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2017-9501 | In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9501 |
2,761 | ImageMagick | 7fd419441bc7103398e313558171d342c6315f44 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7fd419441bc7103398e313558171d342c6315f44 | Added check for incorrect number of meta channels report in #492. | 1 | static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
cache_filename[MagickPathExtent],
id[MagickPathExtent],
keyword[MagickPathExtent],
*options;
const unsigned char
*p;
GeometryInfo
geometry_info;
Image
*image;
int
c;
LinkedListInfo
... | 109,762,771,306,384,910,000,000,000,000,000,000,000 | mpc.c | 33,984,905,082,564,350,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-9499 | In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function SetPixelChannelAttributes, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9499 |
160,145 | ImageMagick | 7fd419441bc7103398e313558171d342c6315f44 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7fd419441bc7103398e313558171d342c6315f44 | Added check for incorrect number of meta channels report in #492. | 0 | static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
cache_filename[MagickPathExtent],
id[MagickPathExtent],
keyword[MagickPathExtent],
*options;
const unsigned char
*p;
GeometryInfo
geometry_info;
Image
*image;
int
c;
LinkedListInfo
... | 146,157,062,208,328,930,000,000,000,000,000,000,000 | mpc.c | 34,935,581,990,711,130,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-9499 | In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function SetPixelChannelAttributes, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9499 |
2,766 | linux | 232cd35d0804cc241eb887bb8d4d9b3b9881c64a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/232cd35d0804cc241eb887bb8d4d9b3b9881c64a | ipv6: fix out of bound writes in __ip6_append_data()
Andrey Konovalov and idaifish@gmail.com reported crashes caused by
one skb shared_info being overwritten from __ip6_append_data()
Andrey program lead to following state :
copy -4200 datalen 2000 fraglen 2040
maxfraglen 2040 alloclen 2048 transhdrlen 0 offset 0 fra... | 1 | static int __ip6_append_data(struct sock *sk,
struct flowi6 *fl6,
struct sk_buff_head *queue,
struct inet_cork *cork,
struct inet6_cork *v6_cork,
struct page_frag *pfrag,
int getfrag(void *from, char *to, int offset,
int len, int odd, struct sk_buff *skb),
v... | 120,470,980,408,117,320,000,000,000,000,000,000,000 | ip6_output.c | 289,318,388,227,575,940,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-9242 | The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9242 |
160,152 | linux | 232cd35d0804cc241eb887bb8d4d9b3b9881c64a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/232cd35d0804cc241eb887bb8d4d9b3b9881c64a | ipv6: fix out of bound writes in __ip6_append_data()
Andrey Konovalov and idaifish@gmail.com reported crashes caused by
one skb shared_info being overwritten from __ip6_append_data()
Andrey program lead to following state :
copy -4200 datalen 2000 fraglen 2040
maxfraglen 2040 alloclen 2048 transhdrlen 0 offset 0 fra... | 0 | static int __ip6_append_data(struct sock *sk,
struct flowi6 *fl6,
struct sk_buff_head *queue,
struct inet_cork *cork,
struct inet6_cork *v6_cork,
struct page_frag *pfrag,
int getfrag(void *from, char *to, int offset,
int len, int odd, struct sk_buff *skb),
v... | 289,760,682,649,556,260,000,000,000,000,000,000,000 | ip6_output.c | 34,337,902,299,321,686,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-9242 | The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9242 |
2,767 | oniguruma | b690371bbf97794b4a1d3f295d4fb9a8b05d402d | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d | fix #59 : access to invalid address by reg->dmax value | 1 | forward_search_range(regex_t* reg, const UChar* str, const UChar* end, UChar* s,
UChar* range, UChar** low, UChar** high, UChar** low_prev)
{
UChar *p, *pprev = (UChar* )NULL;
#ifdef ONIG_DEBUG_SEARCH
fprintf(stderr, "forward_search_range: str: %d, end: %d, s: %d, range: %d\n",
(int )str, (int )end, (int... | 107,914,413,019,882,700,000,000,000,000,000,000,000 | regexec.c | 288,161,812,901,203,540,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9229 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normall... | https://nvd.nist.gov/vuln/detail/CVE-2017-9229 |
160,153 | oniguruma | b690371bbf97794b4a1d3f295d4fb9a8b05d402d | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d | fix #59 : access to invalid address by reg->dmax value | 0 | forward_search_range(regex_t* reg, const UChar* str, const UChar* end, UChar* s,
UChar* range, UChar** low, UChar** high, UChar** low_prev)
{
UChar *p, *pprev = (UChar* )NULL;
#ifdef ONIG_DEBUG_SEARCH
fprintf(stderr, "forward_search_range: str: %d, end: %d, s: %d, range: %d\n",
(int )str, (int )end, (int... | 29,297,642,222,852,117,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2017-9229 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normall... | https://nvd.nist.gov/vuln/detail/CVE-2017-9229 |
2,769 | oniguruma | 166a6c3999bf06b4de0ab4ce6b088a468cc4029f | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/166a6c3999bf06b4de0ab4ce6b088a468cc4029f | fix #56 : return invalid result for codepoint 0xFFFFFFFF | 1 | unicode_unfold_key(OnigCodePoint code)
{
static const struct ByUnfoldKey wordlist[] =
{
{0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},
{0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},
... | 128,717,731,226,755,270,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-9225 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A... | https://nvd.nist.gov/vuln/detail/CVE-2017-9225 |
160,154 | oniguruma | 166a6c3999bf06b4de0ab4ce6b088a468cc4029f | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/166a6c3999bf06b4de0ab4ce6b088a468cc4029f | fix #56 : return invalid result for codepoint 0xFFFFFFFF | 0 | unicode_unfold_key(OnigCodePoint code)
{
static const struct ByUnfoldKey wordlist[] =
{
{0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},
{0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},
... | 130,097,933,951,483,600,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-9225 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A... | https://nvd.nist.gov/vuln/detail/CVE-2017-9225 |
2,771 | systemd | a924f43f30f9c4acaf70618dd2a055f8b0f166be | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | resolved: bugfix of null pointer p->question dereferencing (#6020)
See https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1621396 | 1 | int dns_packet_is_reply_for(DnsPacket *p, const DnsResourceKey *key) {
int r;
assert(p);
assert(key);
/* Checks if the specified packet is a reply for the specified
* key and the specified key is the only one in the question
* section. */
if (DNS_PACKET_QR(p)... | 149,971,713,116,709,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9217 | systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section. | https://nvd.nist.gov/vuln/detail/CVE-2017-9217 |
160,155 | systemd | a924f43f30f9c4acaf70618dd2a055f8b0f166be | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | resolved: bugfix of null pointer p->question dereferencing (#6020)
See https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1621396 | 0 | int dns_packet_is_reply_for(DnsPacket *p, const DnsResourceKey *key) {
int r;
assert(p);
assert(key);
/* Checks if the specified packet is a reply for the specified
* key and the specified key is the only one in the question
* section. */
if (DNS_PACKET_QR(p)... | 330,970,570,727,090,560,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9217 | systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section. | https://nvd.nist.gov/vuln/detail/CVE-2017-9217 |
2,772 | linux | 9933e113c2e87a9f46a40fde8dafbf801dca1ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9 | crypto: skcipher - Add missing API setkey checks
The API setkey checks for key sizes and alignment went AWOL during the
skcipher conversion. This patch restores them.
Cc: <stable@vger.kernel.org>
Fixes: 4e6c3df4d729 ("crypto: skcipher - Add low-level skcipher...")
Reported-by: Baozeng <sploving1@gmail.com>
Signed-of... | 1 | static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)
{
struct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);
struct skcipher_alg *alg = crypto_skcipher_alg(skcipher);
if (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)
return crypto_init_skcipher_ops_blkcipher(tfm);
if (tfm->__crt_alg->cra_... | 61,488,329,509,381,175,000,000,000,000,000,000,000 | skcipher.c | 125,395,647,683,953,660,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9211 | The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2017-9211 |
160,156 | linux | 9933e113c2e87a9f46a40fde8dafbf801dca1ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9 | crypto: skcipher - Add missing API setkey checks
The API setkey checks for key sizes and alignment went AWOL during the
skcipher conversion. This patch restores them.
Cc: <stable@vger.kernel.org>
Fixes: 4e6c3df4d729 ("crypto: skcipher - Add low-level skcipher...")
Reported-by: Baozeng <sploving1@gmail.com>
Signed-of... | 0 | static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)
{
struct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);
struct skcipher_alg *alg = crypto_skcipher_alg(skcipher);
if (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)
return crypto_init_skcipher_ops_blkcipher(tfm);
if (tfm->__crt_alg->cra_... | 97,835,912,823,249,900,000,000,000,000,000,000,000 | skcipher.c | 184,424,225,580,849,200,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9211 | The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2017-9211 |
2,777 | imageworsener | dc49c807926b96e503bd7c0dec35119eecd6c6fe | https://github.com/jsummers/imageworsener | https://github.com/jsummers/imageworsener/commit/dc49c807926b96e503bd7c0dec35119eecd6c6fe | Double-check that the input image's density is valid
Fixes a bug that could result in division by zero, at least for a JPEG
source image.
Fixes issues #19, #20 | 1 | IW_IMPL(int) iw_get_input_density(struct iw_context *ctx,
double *px, double *py, int *pcode)
{
*px = 1.0;
*py = 1.0;
*pcode = ctx->img1.density_code;
if(ctx->img1.density_code!=IW_DENSITY_UNKNOWN) {
*px = ctx->img1.density_x;
*py = ctx->img1.density_y;
return 1;
}
return 0;
}
| 145,137,936,264,817,800,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-9201 | imagew-cmd.c:850:46 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted image, related to imagew-api.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9201 |
160,161 | imageworsener | dc49c807926b96e503bd7c0dec35119eecd6c6fe | https://github.com/jsummers/imageworsener | https://github.com/jsummers/imageworsener/commit/dc49c807926b96e503bd7c0dec35119eecd6c6fe | Double-check that the input image's density is valid
Fixes a bug that could result in division by zero, at least for a JPEG
source image.
Fixes issues #19, #20 | 0 | IW_IMPL(int) iw_get_input_density(struct iw_context *ctx,
double *px, double *py, int *pcode)
{
*px = 1.0;
*py = 1.0;
*pcode = IW_DENSITY_UNKNOWN;
if(ctx->img1.density_code==IW_DENSITY_UNKNOWN) {
return 0;
}
if(!iw_is_valid_density(ctx->img1.density_x, ctx->img1.density_y,
ctx->img1.density_code))
{
... | 106,046,925,296,136,130,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-9201 | imagew-cmd.c:850:46 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted image, related to imagew-api.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9201 |
2,778 | linux | 0d0e57697f162da4aa218b5feafe614fb666db07 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 | bpf: don't let ldimm64 leak map addresses on unprivileged
The patch fixes two things at once:
1) It checks the env->allow_ptr_leaks and only prints the map address to
the log if we have the privileges to do so, otherwise it just dumps 0
as we would when kptr_restrict is enabled on %pK. Given the latter is
of... | 1 | static int do_check(struct bpf_verifier_env *env)
{
struct bpf_verifier_state *state = &env->cur_state;
struct bpf_insn *insns = env->prog->insnsi;
struct bpf_reg_state *regs = state->regs;
int insn_cnt = env->prog->len;
int insn_idx, prev_insn_idx = 0;
int insn_processed = 0;
bool do_print_state = false;
init... | 267,242,719,816,233,600,000,000,000,000,000,000,000 | verifier.c | 294,082,422,712,252,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9150 | The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9150 |
160,162 | linux | 0d0e57697f162da4aa218b5feafe614fb666db07 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 | bpf: don't let ldimm64 leak map addresses on unprivileged
The patch fixes two things at once:
1) It checks the env->allow_ptr_leaks and only prints the map address to
the log if we have the privileges to do so, otherwise it just dumps 0
as we would when kptr_restrict is enabled on %pK. Given the latter is
of... | 0 | static int do_check(struct bpf_verifier_env *env)
{
struct bpf_verifier_state *state = &env->cur_state;
struct bpf_insn *insns = env->prog->insnsi;
struct bpf_reg_state *regs = state->regs;
int insn_cnt = env->prog->len;
int insn_idx, prev_insn_idx = 0;
int insn_processed = 0;
bool do_print_state = false;
init... | 249,847,876,584,992,560,000,000,000,000,000,000,000 | verifier.c | 98,733,647,307,465,000,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9150 | The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9150 |
2,779 | linux | 0d0e57697f162da4aa218b5feafe614fb666db07 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 | bpf: don't let ldimm64 leak map addresses on unprivileged
The patch fixes two things at once:
1) It checks the env->allow_ptr_leaks and only prints the map address to
the log if we have the privileges to do so, otherwise it just dumps 0
as we would when kptr_restrict is enabled on %pK. Given the latter is
of... | 1 | static void print_bpf_insn(struct bpf_insn *insn)
{
u8 class = BPF_CLASS(insn->code);
if (class == BPF_ALU || class == BPF_ALU64) {
if (BPF_SRC(insn->code) == BPF_X)
verbose("(%02x) %sr%d %s %sr%d\n",
insn->code, class == BPF_ALU ? "(u32) " : "",
insn->dst_reg,
bpf_alu_string[BPF_OP(insn->code) >... | 308,871,137,822,813,300,000,000,000,000,000,000,000 | verifier.c | 294,082,422,712,252,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9150 | The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9150 |
160,163 | linux | 0d0e57697f162da4aa218b5feafe614fb666db07 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 | bpf: don't let ldimm64 leak map addresses on unprivileged
The patch fixes two things at once:
1) It checks the env->allow_ptr_leaks and only prints the map address to
the log if we have the privileges to do so, otherwise it just dumps 0
as we would when kptr_restrict is enabled on %pK. Given the latter is
of... | 0 | static void print_bpf_insn(struct bpf_insn *insn)
static void print_bpf_insn(const struct bpf_verifier_env *env,
const struct bpf_insn *insn)
{
u8 class = BPF_CLASS(insn->code);
if (class == BPF_ALU || class == BPF_ALU64) {
if (BPF_SRC(insn->code) == BPF_X)
verbose("(%02x) %sr%d %s %sr%d\n",
insn->... | 196,843,249,973,663,040,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-9150 | The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9150 |
2,780 | ImageMagick | 7fdf9ea808caa3c81a0eb42656e5fafc59084198 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7fdf9ea808caa3c81a0eb42656e5fafc59084198 | None | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
IndexPacket
index;
int
op... | 253,340,010,299,841,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9144 | In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9144 |
160,164 | ImageMagick | 7fdf9ea808caa3c81a0eb42656e5fafc59084198 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7fdf9ea808caa3c81a0eb42656e5fafc59084198 | None | 0 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
#define ThrowRLEException(exception,message) \
{ \
if (colormap != (unsigned char *) ... | 97,549,085,659,554,010,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9144 | In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9144 |
2,781 | ImageMagick | 7b8c1df65b25d6671f113e2306982eded44ce3b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b8c1df65b25d6671f113e2306982eded44ce3b4 | None | 1 | static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const unsigned char
*pixels;
Image
*image;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
MagickBooleanType
status;
size_t
length;
ssize_t
count,
y;
/*
Open image file.
*... | 223,781,554,613,943,000,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-9143 | In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9143 |
160,165 | ImageMagick | 7b8c1df65b25d6671f113e2306982eded44ce3b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b8c1df65b25d6671f113e2306982eded44ce3b4 | None | 0 | static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const unsigned char
*pixels;
Image
*image;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
MagickBooleanType
status;
size_t
length;
ssize_t
count,
y;
/*
Open image file.
*... | 253,420,481,145,240,760,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-9143 | In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9143 |
2,782 | ImageMagick | 72f5c8632bff2daf3c95005f9b4cf2982786b52a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/72f5c8632bff2daf3c95005f9b4cf2982786b52a | None | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 237,712,577,469,856,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9142 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9142 |
160,166 | ImageMagick | 72f5c8632bff2daf3c95005f9b4cf2982786b52a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/72f5c8632bff2daf3c95005f9b4cf2982786b52a | None | 0 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 95,021,352,086,319,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9142 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9142 |
2,783 | ImageMagick | f5910e91b0778e03ded45b9022be8eb8f77942cd | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f5910e91b0778e03ded45b9022be8eb8f77942cd | None | 1 | static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status,
cubemap = MagickFalse,
volume = MagickFalse,
matte;
CompressionType
compression;
DDSInfo
dds_info;
DDSDecoder
*decoder;
size_t
n,
num_images... | 98,055,214,651,978,080,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9141 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9141 |
160,167 | ImageMagick | f5910e91b0778e03ded45b9022be8eb8f77942cd | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f5910e91b0778e03ded45b9022be8eb8f77942cd | None | 0 | static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status,
cubemap = MagickFalse,
volume = MagickFalse,
matte;
CompressionType
compression;
DDSInfo
dds_info;
DDSDecoder
*decoder;
size_t
n,
num_images... | 226,979,234,127,131,120,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9141 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9141 |
2,784 | ImageMagick | 1c358ffe0049f768dd49a8a889c1cbf99ac9849b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1c358ffe0049f768dd49a8a889c1cbf99ac9849b | Reset memory for RLE decoder (patch provided by scarybeasts) | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 286,992,895,385,432,100,000,000,000,000,000,000,000 | rle.c | 133,078,342,380,417,530,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9098 | ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multipl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9098 |
160,168 | ImageMagick | 1c358ffe0049f768dd49a8a889c1cbf99ac9849b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1c358ffe0049f768dd49a8a889c1cbf99ac9849b | Reset memory for RLE decoder (patch provided by scarybeasts) | 0 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 284,056,673,777,922,360,000,000,000,000,000,000,000 | rle.c | 220,972,855,613,568,480,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9098 | ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multipl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9098 |
2,785 | linux | 83eaddab4378db256d00d295bda6ca997cd13a52 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52 | ipv6/dccp: do not inherit ipv6_mc_list from parent
Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
we should clear ipv6_mc_list etc. for IPv6 sockets too.
Cc: Eric Dumazet <edumazet@google.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
S... | 1 | static struct sock *dccp_v6_request_recv_sock(const struct sock *sk,
struct sk_buff *skb,
struct request_sock *req,
struct dst_entry *dst,
struct request_sock *req_unhash,
bool *own_req)
{
struct inet_request_sock *ireq = inet_rsk(req);
struct ipv6_pinfo *newnp;
... | 280,222,012,026,830,700,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9077 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9077 |
160,169 | linux | 83eaddab4378db256d00d295bda6ca997cd13a52 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52 | ipv6/dccp: do not inherit ipv6_mc_list from parent
Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
we should clear ipv6_mc_list etc. for IPv6 sockets too.
Cc: Eric Dumazet <edumazet@google.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
S... | 0 | static struct sock *dccp_v6_request_recv_sock(const struct sock *sk,
struct sk_buff *skb,
struct request_sock *req,
struct dst_entry *dst,
struct request_sock *req_unhash,
bool *own_req)
{
struct inet_request_sock *ireq = inet_rsk(req);
struct ipv6_pinfo *newnp;
... | 209,475,657,741,606,050,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9077 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9077 |
2,786 | linux | 83eaddab4378db256d00d295bda6ca997cd13a52 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52 | ipv6/dccp: do not inherit ipv6_mc_list from parent
Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
we should clear ipv6_mc_list etc. for IPv6 sockets too.
Cc: Eric Dumazet <edumazet@google.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
S... | 1 | static struct sock *tcp_v6_syn_recv_sock(const struct sock *sk, struct sk_buff *skb,
struct request_sock *req,
struct dst_entry *dst,
struct request_sock *req_unhash,
bool *own_req)
{
struct inet_request_sock *ireq;
struct ipv6_pinfo *newnp;
const struct ipv6_pinfo *np = inet6_sk(sk);
struct... | 161,845,565,954,695,880,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9077 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9077 |
160,170 | linux | 83eaddab4378db256d00d295bda6ca997cd13a52 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52 | ipv6/dccp: do not inherit ipv6_mc_list from parent
Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
we should clear ipv6_mc_list etc. for IPv6 sockets too.
Cc: Eric Dumazet <edumazet@google.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
S... | 0 | static struct sock *tcp_v6_syn_recv_sock(const struct sock *sk, struct sk_buff *skb,
struct request_sock *req,
struct dst_entry *dst,
struct request_sock *req_unhash,
bool *own_req)
{
struct inet_request_sock *ireq;
struct ipv6_pinfo *newnp;
const struct ipv6_pinfo *np = inet6_sk(sk);
struct... | 305,969,042,823,369,580,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9077 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9077 |
2,787 | linux | fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8 | sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
SCTP needs fixes similar to 83eaddab4378 ("ipv6/dccp: do not inherit
ipv6_mc_list from parent"), otherwise bad things can happen.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Tested-by: Andrey Konovalov <a... | 1 | static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
struct sctp_association *asoc,
bool kern)
{
struct sock *newsk;
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
struct sctp6_sock *newsctp6sk;
struct ipv6_txoptions *opt;
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_pro... | 192,876,189,377,108,080,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9075 | The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9075 |
160,171 | linux | fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8 | sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
SCTP needs fixes similar to 83eaddab4378 ("ipv6/dccp: do not inherit
ipv6_mc_list from parent"), otherwise bad things can happen.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Tested-by: Andrey Konovalov <a... | 0 | static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
struct sctp_association *asoc,
bool kern)
{
struct sock *newsk;
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
struct sctp6_sock *newsctp6sk;
struct ipv6_txoptions *opt;
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_pro... | 149,753,577,082,364,600,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9075 | The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9075 |
2,840 | libav | fe6eea99efac66839052af547426518efd970b24 | https://github.com/libav/libav | https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24 | nsvdec: don't ignore the return value of av_get_packet()
Fixes invalid reads with corrupted files.
CC: libav-stable@libav.org
Bug-Id: 1039 | 1 | static int nsv_read_chunk(AVFormatContext *s, int fill_header)
{
NSVContext *nsv = s->priv_data;
AVIOContext *pb = s->pb;
AVStream *st[2] = {NULL, NULL};
NSVStream *nst;
AVPacket *pkt;
int i, err = 0;
uint8_t auxcount; /* number of aux metadata, also 4 bits of vsize */
uint32_t vsize;
... | 329,107,632,410,302,050,000,000,000,000,000,000,000 | nsvdec.c | 312,307,119,600,340,800,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9051 | libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9051 |
160,223 | libav | fe6eea99efac66839052af547426518efd970b24 | https://github.com/libav/libav | https://github.com/libav/libav/commit/fe6eea99efac66839052af547426518efd970b24 | nsvdec: don't ignore the return value of av_get_packet()
Fixes invalid reads with corrupted files.
CC: libav-stable@libav.org
Bug-Id: 1039 | 0 | static int nsv_read_chunk(AVFormatContext *s, int fill_header)
{
NSVContext *nsv = s->priv_data;
AVIOContext *pb = s->pb;
AVStream *st[2] = {NULL, NULL};
NSVStream *nst;
AVPacket *pkt;
int i, err = 0;
uint8_t auxcount; /* number of aux metadata, also 4 bits of vsize */
uint32_t vsize;
... | 7,951,642,061,843,572,000,000,000,000,000,000,000 | nsvdec.c | 58,686,573,162,961,860,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9051 | libav before 12.1 is vulnerable to an invalid read of size 1 due to NULL pointer dereferencing in the nsv_read_chunk function in libavformat/nsvdec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9051 |
2,843 | linux | 30572418b445d85fcfe6c8fe84c947d2606767d8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/30572418b445d85fcfe6c8fe84c947d2606767d8 | USB: serial: omninet: fix reference leaks at open
This driver needlessly took another reference to the tty on open, a
reference which was then never released on close. This lead to not just
a leak of the tty, but also a driver reference leak that prevented the
driver from being unloaded after a port had once been open... | 1 | static int omninet_open(struct tty_struct *tty, struct usb_serial_port *port)
{
struct usb_serial *serial = port->serial;
struct usb_serial_port *wport;
wport = serial->port[1];
tty_port_tty_set(&wport->port, tty);
return usb_serial_generic_open(tty, port);
}
| 228,248,121,981,779,100,000,000,000,000,000,000,000 | omninet.c | 237,005,556,314,206,100,000,000,000,000,000,000,000 | [
"CWE-404"
] | CVE-2017-8925 | The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling. | https://nvd.nist.gov/vuln/detail/CVE-2017-8925 |
160,226 | linux | 30572418b445d85fcfe6c8fe84c947d2606767d8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/30572418b445d85fcfe6c8fe84c947d2606767d8 | USB: serial: omninet: fix reference leaks at open
This driver needlessly took another reference to the tty on open, a
reference which was then never released on close. This lead to not just
a leak of the tty, but also a driver reference leak that prevented the
driver from being unloaded after a port had once been open... | 0 | static int omninet_open(struct tty_struct *tty, struct usb_serial_port *port)
{
return usb_serial_generic_open(tty, port);
}
| 7,979,236,705,846,202,000,000,000,000,000,000,000 | omninet.c | 215,322,436,354,123,830,000,000,000,000,000,000,000 | [
"CWE-404"
] | CVE-2017-8925 | The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling. | https://nvd.nist.gov/vuln/detail/CVE-2017-8925 |
2,845 | linux | 657831ffc38e30092a2d5f03d385d710eb88b09a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a | dccp/tcp: do not inherit mc_list from parent
syzkaller found a way to trigger double frees from ip_mc_drop_socket()
It turns out that leave a copy of parent mc_list at accept() time,
which is very bad.
Very similar to commit 8b485ce69876 ("tcp: do not inherit
fastopen_req from parent")
Initial report from Pray3r, c... | 1 | struct sock *inet_csk_clone_lock(const struct sock *sk,
const struct request_sock *req,
const gfp_t priority)
{
struct sock *newsk = sk_clone_lock(sk, priority);
if (newsk) {
struct inet_connection_sock *newicsk = inet_csk(newsk);
newsk->sk_state = TCP_SYN_RECV;
newicsk->icsk_bind_hash = NULL;
in... | 228,213,845,731,710,600,000,000,000,000,000,000,000 | inet_connection_sock.c | 173,250,766,656,989,700,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-8890 | The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. | https://nvd.nist.gov/vuln/detail/CVE-2017-8890 |
160,227 | linux | 657831ffc38e30092a2d5f03d385d710eb88b09a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/657831ffc38e30092a2d5f03d385d710eb88b09a | dccp/tcp: do not inherit mc_list from parent
syzkaller found a way to trigger double frees from ip_mc_drop_socket()
It turns out that leave a copy of parent mc_list at accept() time,
which is very bad.
Very similar to commit 8b485ce69876 ("tcp: do not inherit
fastopen_req from parent")
Initial report from Pray3r, c... | 0 | struct sock *inet_csk_clone_lock(const struct sock *sk,
const struct request_sock *req,
const gfp_t priority)
{
struct sock *newsk = sk_clone_lock(sk, priority);
if (newsk) {
struct inet_connection_sock *newicsk = inet_csk(newsk);
newsk->sk_state = TCP_SYN_RECV;
newicsk->icsk_bind_hash = NULL;
in... | 144,652,886,778,199,720,000,000,000,000,000,000,000 | inet_connection_sock.c | 7,950,430,178,276,012,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-8890 | The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. | https://nvd.nist.gov/vuln/detail/CVE-2017-8890 |
2,846 | media-tree | 354dd3924a2e43806774953de536257548b5002c | https://github.com/stoth68000/media-tree | https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c | [PATCH] saa7164: Bug - Double fetch PCIe access condition
Avoid a double fetch by reusing the values from the prior transfer.
Originally reported via https://bugzilla.kernel.org/show_bug.cgi?id=195559
Thanks to Pengfei Wang <wpengfeinudt@gmail.com> for reporting.
Signed-off-by: Steven Toth <stoth@kernellabs.com> | 1 | int saa7164_bus_get(struct saa7164_dev *dev, struct tmComResInfo* msg,
void *buf, int peekonly)
{
struct tmComResBusInfo *bus = &dev->bus;
u32 bytes_to_read, write_distance, curr_grp, curr_gwp,
new_grp, buf_size, space_rem;
struct tmComResInfo msg_tmp;
int ret = SAA_ERR_BAD_PARAMETER;
saa7164_bus_verify(dev);
... | 117,942,364,588,084,660,000,000,000,000,000,000,000 | saa7164-bus.c | 229,727,223,372,613,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-8831 | The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2017-8831 |
160,228 | media-tree | 354dd3924a2e43806774953de536257548b5002c | https://github.com/stoth68000/media-tree | https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c | [PATCH] saa7164: Bug - Double fetch PCIe access condition
Avoid a double fetch by reusing the values from the prior transfer.
Originally reported via https://bugzilla.kernel.org/show_bug.cgi?id=195559
Thanks to Pengfei Wang <wpengfeinudt@gmail.com> for reporting.
Signed-off-by: Steven Toth <stoth@kernellabs.com> | 0 | int saa7164_bus_get(struct saa7164_dev *dev, struct tmComResInfo* msg,
void *buf, int peekonly)
{
struct tmComResBusInfo *bus = &dev->bus;
u32 bytes_to_read, write_distance, curr_grp, curr_gwp,
new_grp, buf_size, space_rem;
struct tmComResInfo msg_tmp;
int ret = SAA_ERR_BAD_PARAMETER;
saa7164_bus_verify(dev);
... | 127,104,825,454,844,970,000,000,000,000,000,000,000 | saa7164-bus.c | 337,555,585,886,897,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-8831 | The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2017-8831 |
2,847 | libetpan | 1fe8fbc032ccda1db9af66d93016b49c16c1f22d | https://github.com/dinhviethoa/libetpan | https://github.com/dinhviethoa/libetpan/commit/1fe8fbc032ccda1db9af66d93016b49c16c1f22d | Fixed crash #274 | 1 | static int mailimf_group_parse(const char * message, size_t length,
size_t * indx,
struct mailimf_group ** result)
{
size_t cur_token;
char * display_name;
struct mailimf_mailbox_list * mailbox_list;
struct mailimf_group * group;
int r;
int res;
cur_token = * indx;
mailbox_li... | 201,558,413,158,031,750,000,000,000,000,000,000,000 | mailimf.c | 184,503,527,321,366,240,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-8825 | A null dereference vulnerability has been found in the MIME handling component of LibEtPan before 1.8, as used in MailCore and MailCore 2. A crash can occur in low-level/imf/mailimf.c during a failed parse of a Cc header containing multiple e-mail addresses. | https://nvd.nist.gov/vuln/detail/CVE-2017-8825 |
160,229 | libetpan | 1fe8fbc032ccda1db9af66d93016b49c16c1f22d | https://github.com/dinhviethoa/libetpan | https://github.com/dinhviethoa/libetpan/commit/1fe8fbc032ccda1db9af66d93016b49c16c1f22d | Fixed crash #274 | 0 | static int mailimf_group_parse(const char * message, size_t length,
size_t * indx,
struct mailimf_group ** result)
{
size_t cur_token;
char * display_name;
struct mailimf_mailbox_list * mailbox_list;
struct mailimf_group * group;
int r;
int res;
clist * list;
cur_token = * indx... | 248,198,546,306,903,340,000,000,000,000,000,000,000 | mailimf.c | 46,172,292,755,855,090,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-8825 | A null dereference vulnerability has been found in the MIME handling component of LibEtPan before 1.8, as used in MailCore and MailCore 2. A crash can occur in low-level/imf/mailimf.c during a failed parse of a Cc header containing multiple e-mail addresses. | https://nvd.nist.gov/vuln/detail/CVE-2017-8825 |
2,855 | yara | 83d799804648c2a0895d40a19835d9b757c6fa4e | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/83d799804648c2a0895d40a19835d9b757c6fa4e | Fix issue #646 (#648)
* Fix issue #646 and some edge cases with wide regexps using \b and \B
* Rename function IS_WORD_CHAR to _yr_re_is_word_char | 1 | int yr_re_exec(
uint8_t* re_code,
uint8_t* input_data,
size_t input_size,
int flags,
RE_MATCH_CALLBACK_FUNC callback,
void* callback_args)
{
uint8_t* ip;
uint8_t* input;
uint8_t mask;
uint8_t value;
RE_FIBER_LIST fibers;
RE_THREAD_STORAGE* storage;
RE_FIBER* fiber;
RE_FIBE... | 71,603,843,470,270,060,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-8294 | libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yr_re_exec function. | https://nvd.nist.gov/vuln/detail/CVE-2017-8294 |
160,236 | yara | 83d799804648c2a0895d40a19835d9b757c6fa4e | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/83d799804648c2a0895d40a19835d9b757c6fa4e | Fix issue #646 (#648)
* Fix issue #646 and some edge cases with wide regexps using \b and \B
* Rename function IS_WORD_CHAR to _yr_re_is_word_char | 0 | int yr_re_exec(
uint8_t* re_code,
uint8_t* input_data,
size_t input_forwards_size,
size_t input_backwards_size,
int flags,
RE_MATCH_CALLBACK_FUNC callback,
void* callback_args)
{
uint8_t* ip;
uint8_t* input;
uint8_t mask;
uint8_t value;
RE_FIBER_LIST fibers;
RE_THREAD_STOR... | 138,935,293,030,046,500,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-8294 | libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yr_re_exec function. | https://nvd.nist.gov/vuln/detail/CVE-2017-8294 |
2,858 | weechat | 2fb346f25f79e412cf0ed314fdf791763c19b70b | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b | irc: fix parsing of DCC filename | 1 | irc_ctcp_dcc_filename_without_quotes (const char *filename)
{
int length;
length = strlen (filename);
if (length > 0)
{
if ((filename[0] == '\"') && (filename[length - 1] == '\"'))
return weechat_strndup (filename + 1, length - 2);
}
return strdup (filename);
}
| 205,848,505,954,917,040,000,000,000,000,000,000,000 | irc-ctcp.c | 222,746,897,467,776,350,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8073 | WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-8073 |
160,239 | weechat | 2fb346f25f79e412cf0ed314fdf791763c19b70b | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b | irc: fix parsing of DCC filename | 0 | irc_ctcp_dcc_filename_without_quotes (const char *filename)
{
int length;
length = strlen (filename);
if (length > 1)
{
if ((filename[0] == '\"') && (filename[length - 1] == '\"'))
return weechat_strndup (filename + 1, length - 2);
}
return strdup (filename);
}
| 146,427,232,397,831,990,000,000,000,000,000,000,000 | irc-ctcp.c | 140,219,125,036,488,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8073 | WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-8073 |
2,859 | linux | 8e9faa15469ed7c7467423db4c62aeed3ff4cae3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8e9faa15469ed7c7467423db4c62aeed3ff4cae3 | HID: cp2112: fix gpio-callback error handling
In case of a zero-length report, the gpio direction_input callback would
currently return success instead of an errno.
Fixes: 1ffb3c40ffb5 ("HID: cp2112: make transfer buffers DMA capable")
Cc: stable <stable@vger.kernel.org> # 4.9
Signed-off-by: Johan Hovold <johan@k... | 1 | static int cp2112_gpio_direction_input(struct gpio_chip *chip, unsigned offset)
{
struct cp2112_device *dev = gpiochip_get_data(chip);
struct hid_device *hdev = dev->hdev;
u8 *buf = dev->in_out_buffer;
int ret;
mutex_lock(&dev->lock);
ret = hid_hw_raw_request(hdev, CP2112_GPIO_CONFIG, buf,
CP2112_GPIO_CONF... | 160,178,556,256,165,060,000,000,000,000,000,000,000 | hid-cp2112.c | 316,560,877,108,462,260,000,000,000,000,000,000,000 | [
"CWE-388"
] | CVE-2017-8072 | The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-8072 |
160,240 | linux | 8e9faa15469ed7c7467423db4c62aeed3ff4cae3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8e9faa15469ed7c7467423db4c62aeed3ff4cae3 | HID: cp2112: fix gpio-callback error handling
In case of a zero-length report, the gpio direction_input callback would
currently return success instead of an errno.
Fixes: 1ffb3c40ffb5 ("HID: cp2112: make transfer buffers DMA capable")
Cc: stable <stable@vger.kernel.org> # 4.9
Signed-off-by: Johan Hovold <johan@k... | 0 | static int cp2112_gpio_direction_input(struct gpio_chip *chip, unsigned offset)
{
struct cp2112_device *dev = gpiochip_get_data(chip);
struct hid_device *hdev = dev->hdev;
u8 *buf = dev->in_out_buffer;
int ret;
mutex_lock(&dev->lock);
ret = hid_hw_raw_request(hdev, CP2112_GPIO_CONFIG, buf,
CP2112_GPIO_CONF... | 213,607,976,835,531,400,000,000,000,000,000,000,000 | hid-cp2112.c | 43,753,497,987,937,430,000,000,000,000,000,000,000 | [
"CWE-388"
] | CVE-2017-8072 | The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-8072 |
2,864 | linux | 2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478 | catc: Use heap buffer for memory size test
Allocating USB buffers on the stack is not portable, and no longer
works on x86_64 (with VMAP_STACK enabled as per default).
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: David S. Miller <davem@davemloft.net> | 1 | static int catc_probe(struct usb_interface *intf, const struct usb_device_id *id)
{
struct device *dev = &intf->dev;
struct usb_device *usbdev = interface_to_usbdev(intf);
struct net_device *netdev;
struct catc *catc;
u8 broadcast[ETH_ALEN];
int i, pktsz, ret;
if (usb_set_interface(usbdev,
intf->altset... | 172,337,252,027,272,000,000,000,000,000,000,000,000 | catc.c | 102,177,431,267,909,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8070 | drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlis... | https://nvd.nist.gov/vuln/detail/CVE-2017-8070 |
160,242 | linux | 2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478 | catc: Use heap buffer for memory size test
Allocating USB buffers on the stack is not portable, and no longer
works on x86_64 (with VMAP_STACK enabled as per default).
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int catc_probe(struct usb_interface *intf, const struct usb_device_id *id)
{
struct device *dev = &intf->dev;
struct usb_device *usbdev = interface_to_usbdev(intf);
struct net_device *netdev;
struct catc *catc;
u8 broadcast[ETH_ALEN];
int pktsz, ret;
if (usb_set_interface(usbdev,
intf->altsettin... | 139,069,277,739,849,160,000,000,000,000,000,000,000 | catc.c | 337,411,785,894,735,850,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8070 | drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlis... | https://nvd.nist.gov/vuln/detail/CVE-2017-8070 |
2,869 | linux | c919a3069c775c1c876bec55e00b2305d5125caa | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c919a3069c775c1c876bec55e00b2305d5125caa | can: gs_usb: Don't use stack memory for USB transfers
Fixes: 05ca5270005c can: gs_usb: add ethtool set_phys_id callback to locate physical device
The gs_usb driver is performing USB transfers using buffers allocated on
the stack. This causes the driver to not function with vmapped stacks.
Instead, allocate memory for... | 1 | static int gs_usb_probe(struct usb_interface *intf,
const struct usb_device_id *id)
{
struct gs_usb *dev;
int rc = -ENOMEM;
unsigned int icount, i;
struct gs_host_config hconf = {
.byte_order = 0x0000beef,
};
struct gs_device_config dconf;
/* send host config */
rc = usb_control_msg(interface_to_usb... | 35,449,025,086,418,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-8066 | drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for... | https://nvd.nist.gov/vuln/detail/CVE-2017-8066 |
160,247 | linux | c919a3069c775c1c876bec55e00b2305d5125caa | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c919a3069c775c1c876bec55e00b2305d5125caa | can: gs_usb: Don't use stack memory for USB transfers
Fixes: 05ca5270005c can: gs_usb: add ethtool set_phys_id callback to locate physical device
The gs_usb driver is performing USB transfers using buffers allocated on
the stack. This causes the driver to not function with vmapped stacks.
Instead, allocate memory for... | 0 | static int gs_usb_probe(struct usb_interface *intf,
const struct usb_device_id *id)
{
struct gs_usb *dev;
int rc = -ENOMEM;
unsigned int icount, i;
struct gs_host_config *hconf;
struct gs_device_config *dconf;
hconf = kmalloc(sizeof(*hconf), GFP_KERNEL);
if (!hconf)
return -ENOMEM;
hconf->byte_order =... | 129,526,070,514,009,270,000,000,000,000,000,000,000 | gs_usb.c | 322,570,541,587,080,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8066 | drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for... | https://nvd.nist.gov/vuln/detail/CVE-2017-8066 |
2,870 | linux | 3b30460c5b0ed762be75a004e924ec3f8711e032 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b30460c5b0ed762be75a004e924ec3f8711e032 | crypto: ccm - move cbcmac input off the stack
Commit f15f05b0a5de ("crypto: ccm - switch to separate cbcmac driver")
refactored the CCM driver to allow separate implementations of the
underlying MAC to be provided by a platform. However, in doing so, it
moved some data from the linear region to the stack, which violat... | 1 | static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain,
unsigned int cryptlen)
{
struct crypto_ccm_req_priv_ctx *pctx = crypto_ccm_reqctx(req);
struct crypto_aead *aead = crypto_aead_reqtfm(req);
struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead);
AHASH_REQUEST_ON_STACK(ahreq, ctx->ma... | 161,394,947,663,770,550,000,000,000,000,000,000,000 | ccm.c | 52,708,401,148,709,490,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8065 | crypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatter... | https://nvd.nist.gov/vuln/detail/CVE-2017-8065 |
160,248 | linux | 3b30460c5b0ed762be75a004e924ec3f8711e032 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b30460c5b0ed762be75a004e924ec3f8711e032 | crypto: ccm - move cbcmac input off the stack
Commit f15f05b0a5de ("crypto: ccm - switch to separate cbcmac driver")
refactored the CCM driver to allow separate implementations of the
underlying MAC to be provided by a platform. However, in doing so, it
moved some data from the linear region to the stack, which violat... | 0 | static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain,
unsigned int cryptlen)
{
struct crypto_ccm_req_priv_ctx *pctx = crypto_ccm_reqctx(req);
struct crypto_aead *aead = crypto_aead_reqtfm(req);
struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead);
AHASH_REQUEST_ON_STACK(ahreq, ctx->ma... | 239,253,501,680,803,600,000,000,000,000,000,000,000 | ccm.c | 212,460,621,552,750,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8065 | crypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatter... | https://nvd.nist.gov/vuln/detail/CVE-2017-8065 |
2,871 | linux | 005145378c9ad7575a01b6ce1ba118fb427f583a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/005145378c9ad7575a01b6ce1ba118fb427f583a | [media] dvb-usb-v2: avoid use-after-free
I ran into a stack frame size warning because of the on-stack copy of
the USB device structure:
drivers/media/usb/dvb-usb-v2/dvb_usb_core.c: In function 'dvb_usbv2_disconnect':
drivers/media/usb/dvb-usb-v2/dvb_usb_core.c:1029:1: error: the frame size of 1104 bytes is larger th... | 1 | void dvb_usbv2_disconnect(struct usb_interface *intf)
{
struct dvb_usb_device *d = usb_get_intfdata(intf);
const char *name = d->name;
struct device dev = d->udev->dev;
dev_dbg(&d->udev->dev, "%s: bInterfaceNumber=%d\n", __func__,
intf->cur_altsetting->desc.bInterfaceNumber);
if (d->props->exit)
d->pr... | 148,512,682,073,296,000,000,000,000,000,000,000,000 | dvb_usb_core.c | 230,411,649,417,370,660,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8064 | drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one ... | https://nvd.nist.gov/vuln/detail/CVE-2017-8064 |
160,249 | linux | 005145378c9ad7575a01b6ce1ba118fb427f583a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/005145378c9ad7575a01b6ce1ba118fb427f583a | [media] dvb-usb-v2: avoid use-after-free
I ran into a stack frame size warning because of the on-stack copy of
the USB device structure:
drivers/media/usb/dvb-usb-v2/dvb_usb_core.c: In function 'dvb_usbv2_disconnect':
drivers/media/usb/dvb-usb-v2/dvb_usb_core.c:1029:1: error: the frame size of 1104 bytes is larger th... | 0 | void dvb_usbv2_disconnect(struct usb_interface *intf)
{
struct dvb_usb_device *d = usb_get_intfdata(intf);
const char *devname = kstrdup(dev_name(&d->udev->dev), GFP_KERNEL);
const char *drvname = d->name;
dev_dbg(&d->udev->dev, "%s: bInterfaceNumber=%d\n", __func__,
intf->cur_altsetting->desc.bInterfaceN... | 277,575,200,022,849,250,000,000,000,000,000,000,000 | dvb_usb_core.c | 222,676,246,389,771,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8064 | drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one ... | https://nvd.nist.gov/vuln/detail/CVE-2017-8064 |
2,872 | linux | 3f190e3aec212fc8c61e202c51400afa7384d4bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3f190e3aec212fc8c61e202c51400afa7384d4bc | [media] cxusb: Use a dma capable buffer also for reading
Commit 17ce039b4e54 ("[media] cxusb: don't do DMA on stack")
added a kmalloc'ed bounce buffer for writes, but missed to do the same
for reads. As the read only happens after the write is finished, we can
reuse the same buffer.
As dvb_usb_generic_rw handles a re... | 1 | static int cxusb_ctrl_msg(struct dvb_usb_device *d,
u8 cmd, u8 *wbuf, int wlen, u8 *rbuf, int rlen)
{
struct cxusb_state *st = d->priv;
int ret, wo;
if (1 + wlen > MAX_XFER_SIZE) {
warn("i2c wr: len=%d is too big!\n", wlen);
return -EOPNOTSUPP;
}
wo = (rbuf == NULL || rlen == 0); /* write-only ... | 94,634,085,436,169,420,000,000,000,000,000,000,000 | cxusb.c | 106,348,669,266,247,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8063 | drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterl... | https://nvd.nist.gov/vuln/detail/CVE-2017-8063 |
160,250 | linux | 3f190e3aec212fc8c61e202c51400afa7384d4bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3f190e3aec212fc8c61e202c51400afa7384d4bc | [media] cxusb: Use a dma capable buffer also for reading
Commit 17ce039b4e54 ("[media] cxusb: don't do DMA on stack")
added a kmalloc'ed bounce buffer for writes, but missed to do the same
for reads. As the read only happens after the write is finished, we can
reuse the same buffer.
As dvb_usb_generic_rw handles a re... | 0 | static int cxusb_ctrl_msg(struct dvb_usb_device *d,
u8 cmd, u8 *wbuf, int wlen, u8 *rbuf, int rlen)
{
struct cxusb_state *st = d->priv;
int ret;
if (1 + wlen > MAX_XFER_SIZE) {
warn("i2c wr: len=%d is too big!\n", wlen);
return -EOPNOTSUPP;
}
if (rlen > MAX_XFER_SIZE) {
warn("i2c rd: len=%d i... | 71,730,088,658,793,610,000,000,000,000,000,000,000 | cxusb.c | 64,150,083,586,250,850,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8063 | drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterl... | https://nvd.nist.gov/vuln/detail/CVE-2017-8063 |
2,878 | linux | 67b0503db9c29b04eadfeede6bebbfe5ddad94ef | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/67b0503db9c29b04eadfeede6bebbfe5ddad94ef | [media] dvb-usb-firmware: don't do DMA on stack
The buffer allocation for the firmware data was changed in
commit 43fab9793c1f ("[media] dvb-usb: don't use stack for firmware load")
but the same applies for the reset value.
Fixes: 43fab9793c1f ("[media] dvb-usb: don't use stack for firmware load")
Cc: stable@vger.ker... | 1 | int usb_cypress_load_firmware(struct usb_device *udev, const struct firmware *fw, int type)
{
struct hexline *hx;
u8 reset;
int ret,pos=0;
hx = kmalloc(sizeof(*hx), GFP_KERNEL);
if (!hx)
return -ENOMEM;
/* stop the CPU */
reset = 1;
if ((ret = usb_cypress_writemem(udev,cypress[type].cpu_cs_register,&... | 176,821,963,037,391,380,000,000,000,000,000,000,000 | dvb-usb-firmware.c | 64,285,303,903,213,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8061 | drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one ... | https://nvd.nist.gov/vuln/detail/CVE-2017-8061 |
160,256 | linux | 67b0503db9c29b04eadfeede6bebbfe5ddad94ef | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/67b0503db9c29b04eadfeede6bebbfe5ddad94ef | [media] dvb-usb-firmware: don't do DMA on stack
The buffer allocation for the firmware data was changed in
commit 43fab9793c1f ("[media] dvb-usb: don't use stack for firmware load")
but the same applies for the reset value.
Fixes: 43fab9793c1f ("[media] dvb-usb: don't use stack for firmware load")
Cc: stable@vger.ker... | 0 | int usb_cypress_load_firmware(struct usb_device *udev, const struct firmware *fw, int type)
{
struct hexline *hx;
u8 *buf;
int ret, pos = 0;
u16 cpu_cs_register = cypress[type].cpu_cs_register;
buf = kmalloc(sizeof(*hx), GFP_KERNEL);
if (!buf)
return -ENOMEM;
hx = (struct hexline *)buf;
/* stop the C... | 186,320,983,394,544,870,000,000,000,000,000,000,000 | dvb-usb-firmware.c | 121,841,472,199,715,560,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8061 | drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one ... | https://nvd.nist.gov/vuln/detail/CVE-2017-8061 |
2,879 | imageworsener | ca3356eb49fee03e2eaf6b6aff826988c1122d93 | https://github.com/jsummers/imageworsener | https://github.com/jsummers/imageworsener/commit/ca3356eb49fee03e2eaf6b6aff826988c1122d93 | Fixed a GIF decoding bug (divide by zero)
Fixes issue #15 | 1 | static int iwgif_read_image(struct iwgifrcontext *rctx)
{
int retval=0;
struct lzwdeccontext d;
size_t subblocksize;
int has_local_ct;
int local_ct_size;
unsigned int root_codesize;
if(!iwgif_read(rctx,rctx->rbuf,9)) goto done;
rctx->image_left = (int)iw_get_ui16le(&rctx->rbuf[0]);
rctx->image_top = (int)iw... | 221,178,602,343,877,060,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-7962 | The iwgif_read_image function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7962 |
160,257 | imageworsener | ca3356eb49fee03e2eaf6b6aff826988c1122d93 | https://github.com/jsummers/imageworsener | https://github.com/jsummers/imageworsener/commit/ca3356eb49fee03e2eaf6b6aff826988c1122d93 | Fixed a GIF decoding bug (divide by zero)
Fixes issue #15 | 0 | static int iwgif_read_image(struct iwgifrcontext *rctx)
{
int retval=0;
struct lzwdeccontext d;
size_t subblocksize;
int has_local_ct;
int local_ct_size;
unsigned int root_codesize;
if(!iwgif_read(rctx,rctx->rbuf,9)) goto done;
rctx->image_left = (int)iw_get_ui16le(&rctx->rbuf[0]);
rctx->image_top = (int)iw... | 2,670,702,582,050,717,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-7962 | The iwgif_read_image function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7962 |
2,890 | feh | f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d | https://github.com/derf/feh | https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d | Fix double-free/OOB-write while receiving IPC data
If a malicious client pretends to be the E17 window manager, it is
possible to trigger an out of boundary heap write while receiving an
IPC message.
The length of the already received message is stored in an unsigned
short, which overflows after receiving 64 KB of da... | 1 | char *enl_ipc_get(const char *msg_data)
{
static char *message = NULL;
static unsigned short len = 0;
char buff[13], *ret_msg = NULL;
register unsigned char i;
unsigned char blen;
if (msg_data == IPC_TIMEOUT) {
return(IPC_TIMEOUT);
}
for (i = 0; i < 12; i++) {
buff[i] = msg_data[i];
}
buff[12] = 0... | 60,648,109,727,763,895,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-7875 | In wallpaper.c in feh before v2.18.3, if a malicious client pretends to be the E17 window manager, it is possible to trigger an out-of-boundary heap write while receiving an IPC message. An integer overflow leads to a buffer overflow and/or a double free. | https://nvd.nist.gov/vuln/detail/CVE-2017-7875 |
160,264 | feh | f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d | https://github.com/derf/feh | https://github.com/derf/feh/commit/f7a547b7ef8fc8ebdeaa4c28515c9d72e592fb6d | Fix double-free/OOB-write while receiving IPC data
If a malicious client pretends to be the E17 window manager, it is
possible to trigger an out of boundary heap write while receiving an
IPC message.
The length of the already received message is stored in an unsigned
short, which overflows after receiving 64 KB of da... | 0 | char *enl_ipc_get(const char *msg_data)
{
static char *message = NULL;
static size_t len = 0;
char buff[13], *ret_msg = NULL;
register unsigned char i;
unsigned char blen;
if (msg_data == IPC_TIMEOUT) {
return(IPC_TIMEOUT);
}
for (i = 0; i < 12; i++) {
buff[i] = msg_data[i];
}
buff[12] = 0;
blen ... | 286,188,562,444,077,050,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-7875 | In wallpaper.c in feh before v2.18.3, if a malicious client pretends to be the E17 window manager, it is possible to trigger an out-of-boundary heap write while receiving an IPC message. An integer overflow leads to a buffer overflow and/or a double free. | https://nvd.nist.gov/vuln/detail/CVE-2017-7875 |
2,891 | FFmpeg | e371f031b942d73e02c090170975561fabd5c264 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e371f031b942d73e02c090170975561fabd5c264 | avcodec/pngdec: Fix off by 1 size in decode_zbuf()
Fixes out of array access
Fixes: 444/fuzz-2-ffmpeg_VIDEO_AV_CODEC_ID_PNG_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_zbuf(AVBPrint *bp, const uint8_t *data,
const uint8_t *data_end)
{
z_stream zstream;
unsigned char *buf;
unsigned buf_size;
int ret;
zstream.zalloc = ff_png_zalloc;
zstream.zfree = ff_png_zfree;
zstream.opaque = NULL;
if (inflateInit(&zstream) !... | 228,936,594,929,323,730,000,000,000,000,000,000,000 | pngdec.c | 41,085,005,464,758,127,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7866 | FFmpeg before 2017-01-23 has an out-of-bounds write caused by a stack-based buffer overflow related to the decode_zbuf function in libavcodec/pngdec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7866 |
160,265 | FFmpeg | e371f031b942d73e02c090170975561fabd5c264 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e371f031b942d73e02c090170975561fabd5c264 | avcodec/pngdec: Fix off by 1 size in decode_zbuf()
Fixes out of array access
Fixes: 444/fuzz-2-ffmpeg_VIDEO_AV_CODEC_ID_PNG_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int decode_zbuf(AVBPrint *bp, const uint8_t *data,
const uint8_t *data_end)
{
z_stream zstream;
unsigned char *buf;
unsigned buf_size;
int ret;
zstream.zalloc = ff_png_zalloc;
zstream.zfree = ff_png_zfree;
zstream.opaque = NULL;
if (inflateInit(&zstream) !... | 256,946,643,067,066,560,000,000,000,000,000,000,000 | pngdec.c | 106,174,170,009,033,120,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7866 | FFmpeg before 2017-01-23 has an out-of-bounds write caused by a stack-based buffer overflow related to the decode_zbuf function in libavcodec/pngdec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7866 |
2,892 | FFmpeg | e477f09d0b3619f3d29173b2cd593e17e2d1978e | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e477f09d0b3619f3d29173b2cd593e17e2d1978e | avcodec/pngdec: Check trns more completely
Fixes out of array access
Fixes: 546/clusterfuzz-testcase-4809433909559296
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_frame_common(AVCodecContext *avctx, PNGDecContext *s,
AVFrame *p, AVPacket *avpkt)
{
AVDictionary *metadata = NULL;
uint32_t tag, length;
int decode_next_dat = 0;
int ret;
for (;;) {
length = bytestream2_get_bytes_left(&s->gb);
if (l... | 274,328,107,409,287,370,000,000,000,000,000,000,000 | pngdec.c | 106,174,170,009,033,120,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7863 | FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7863 |
160,266 | FFmpeg | e477f09d0b3619f3d29173b2cd593e17e2d1978e | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e477f09d0b3619f3d29173b2cd593e17e2d1978e | avcodec/pngdec: Check trns more completely
Fixes out of array access
Fixes: 546/clusterfuzz-testcase-4809433909559296
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int decode_frame_common(AVCodecContext *avctx, PNGDecContext *s,
AVFrame *p, AVPacket *avpkt)
{
AVDictionary *metadata = NULL;
uint32_t tag, length;
int decode_next_dat = 0;
int ret;
for (;;) {
length = bytestream2_get_bytes_left(&s->gb);
if (l... | 171,181,388,854,350,440,000,000,000,000,000,000,000 | pngdec.c | 280,055,324,889,603,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7863 | FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7863 |
2,894 | radare2 | d2632f6483a3ceb5d8e0a5fb11142c51c43978b4 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d2632f6483a3ceb5d8e0a5fb11142c51c43978b4 | Fix crash in fuzzed wasm r2_hoobr_consume_init_expr | 1 | static size_t consume_init_expr (ut8 *buf, ut8 *max, ut8 eoc, void *out, ut32 *offset) {
ut32 i = 0;
while (buf + i < max && buf[i] != eoc) {
i += 1;
}
if (buf[i] != eoc) {
return 0;
}
if (offset) {
*offset += i + 1;
}
return i + 1;
}
| 84,335,932,977,894,030,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-7854 | The consume_init_expr function in wasm.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7854 |
160,269 | radare2 | d2632f6483a3ceb5d8e0a5fb11142c51c43978b4 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d2632f6483a3ceb5d8e0a5fb11142c51c43978b4 | Fix crash in fuzzed wasm r2_hoobr_consume_init_expr | 0 | static size_t consume_init_expr (ut8 *buf, ut8 *max, ut8 eoc, void *out, ut32 *offset) {
ut32 i = 0;
while (buf + i < max && buf[i] != eoc) {
i++;
}
if (buf[i] != eoc) {
return 0;
}
if (offset) {
*offset += i + 1;
}
return i + 1;
}
| 127,145,722,673,287,530,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-7854 | The consume_init_expr function in wasm.c in radare2 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted Web Assembly file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7854 |
2,897 | libsndfile | 60b234301adf258786d8b90be5c1d437fc8799e0 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0 | src/flac.c: Improve error handling
Especially when dealing with corrupt or malicious files. | 1 | flac_buffer_copy (SF_PRIVATE *psf)
{ FLAC_PRIVATE* pflac = (FLAC_PRIVATE*) psf->codec_data ;
const FLAC__Frame *frame = pflac->frame ;
const int32_t* const *buffer = pflac->wbuffer ;
unsigned i = 0, j, offset, channels, len ;
/*
** frame->header.blocksize is variable and we're using a constant blocksize
** of FL... | 89,983,668,964,280,690,000,000,000,000,000,000,000 | flac.c | 74,586,289,804,404,630,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7585 | In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7585 |
160,272 | libsndfile | 60b234301adf258786d8b90be5c1d437fc8799e0 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0 | src/flac.c: Improve error handling
Especially when dealing with corrupt or malicious files. | 0 | flac_buffer_copy (SF_PRIVATE *psf)
{ FLAC_PRIVATE* pflac = (FLAC_PRIVATE*) psf->codec_data ;
const FLAC__Frame *frame = pflac->frame ;
const int32_t* const *buffer = pflac->wbuffer ;
unsigned i = 0, j, offset, channels, len ;
/*
** frame->header.blocksize is variable and we're using a constant blocksize
** of FL... | 28,750,340,989,559,370,000,000,000,000,000,000,000 | flac.c | 59,692,206,578,399,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7585 | In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7585 |
2,899 | linux | e6838a29ecb484c97e4efef9429643b9851fba6e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e | nfsd: check for oversized NFSv2/v3 arguments
A client can append random data to the end of an NFSv2 or NFSv3 RPC call
without our complaining; we'll just stop parsing at the end of the
expected data and ignore the rest.
Encoded arguments and replies are stored together in an array of pages,
and if a call is too large... | 1 | nfsd_dispatch(struct svc_rqst *rqstp, __be32 *statp)
{
struct svc_procedure *proc;
kxdrproc_t xdr;
__be32 nfserr;
__be32 *nfserrp;
dprintk("nfsd_dispatch: vers %d proc %d\n",
rqstp->rq_vers, rqstp->rq_proc);
proc = rqstp->rq_procinfo;
/*
* Give the xdr decoder a chance to change this if it wa... | 205,869,635,902,889,700,000,000,000,000,000,000,000 | nfssvc.c | 20,448,023,932,971,708,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-7645 | The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7645 |
160,274 | linux | e6838a29ecb484c97e4efef9429643b9851fba6e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e | nfsd: check for oversized NFSv2/v3 arguments
A client can append random data to the end of an NFSv2 or NFSv3 RPC call
without our complaining; we'll just stop parsing at the end of the
expected data and ignore the rest.
Encoded arguments and replies are stored together in an array of pages,
and if a call is too large... | 0 | nfsd_dispatch(struct svc_rqst *rqstp, __be32 *statp)
{
struct svc_procedure *proc;
kxdrproc_t xdr;
__be32 nfserr;
__be32 *nfserrp;
dprintk("nfsd_dispatch: vers %d proc %d\n",
rqstp->rq_vers, rqstp->rq_proc);
proc = rqstp->rq_procinfo;
if (nfs_request_too_big(rqstp, proc)) {
dprintk("nfsd: NFSv%... | 52,363,116,686,781,550,000,000,000,000,000,000,000 | nfssvc.c | 180,555,028,489,966,750,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-7645 | The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7645 |
2,902 | libsndfile | f457b7b5ecfe91697ed01cfc825772c4d8de1236 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236 | src/id3.c : Improve error handling | 1 | id3_skip (SF_PRIVATE * psf)
{ unsigned char buf [10] ;
memset (buf, 0, sizeof (buf)) ;
psf_binheader_readf (psf, "pb", 0, buf, 10) ;
if (buf [0] == 'I' && buf [1] == 'D' && buf [2] == '3')
{ int offset = buf [6] & 0x7f ;
offset = (offset << 7) | (buf [7] & 0x7f) ;
offset = (offset << 7) | (buf [8] & 0x7f) ;
... | 72,220,393,470,780,400,000,000,000,000,000,000,000 | id3.c | 5,429,618,960,530,921,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7586 | In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7586 |
160,275 | libsndfile | f457b7b5ecfe91697ed01cfc825772c4d8de1236 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236 | src/id3.c : Improve error handling | 0 | id3_skip (SF_PRIVATE * psf)
{ unsigned char buf [10] ;
memset (buf, 0, sizeof (buf)) ;
psf_binheader_readf (psf, "pb", 0, buf, 10) ;
if (buf [0] == 'I' && buf [1] == 'D' && buf [2] == '3')
{ int offset = buf [6] & 0x7f ;
offset = (offset << 7) | (buf [7] & 0x7f) ;
offset = (offset << 7) | (buf [8] & 0x7f) ;
... | 84,809,406,142,334,560,000,000,000,000,000,000,000 | id3.c | 166,592,560,442,063,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7586 | In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7586 |
2,904 | linux | 8f44c9a41386729fea410e688959ddaa9d51be7c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c | brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
The lower level nl80211 code in cfg80211 ensures that "len" is between
25 and NL80211_ATTR_FRAME (2304). We subtract DOT11_MGMT_HDR_LEN (24) from
"len" so thats's max of 2280. However, the action_frame->data[] buffer is
only BRCMF_FIL_ACTION_FRAME_SI... | 1 | brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
struct cfg80211_mgmt_tx_params *params, u64 *cookie)
{
struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
struct ieee80211_channel *chan = params->chan;
const u8 *buf = params->buf;
size_t len = params->len;
const struct ieee80211_... | 43,745,744,403,145,920,000,000,000,000,000,000,000 | cfg80211.c | 271,021,627,446,521,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7541 | The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-7541 |
160,277 | linux | 8f44c9a41386729fea410e688959ddaa9d51be7c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c | brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
The lower level nl80211 code in cfg80211 ensures that "len" is between
25 and NL80211_ATTR_FRAME (2304). We subtract DOT11_MGMT_HDR_LEN (24) from
"len" so thats's max of 2280. However, the action_frame->data[] buffer is
only BRCMF_FIL_ACTION_FRAME_SI... | 0 | brcmf_cfg80211_mgmt_tx(struct wiphy *wiphy, struct wireless_dev *wdev,
struct cfg80211_mgmt_tx_params *params, u64 *cookie)
{
struct brcmf_cfg80211_info *cfg = wiphy_to_cfg(wiphy);
struct ieee80211_channel *chan = params->chan;
const u8 *buf = params->buf;
size_t len = params->len;
const struct ieee80211_... | 155,156,238,067,653,750,000,000,000,000,000,000,000 | cfg80211.c | 203,707,540,889,319,140,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7541 | The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-7541 |
2,906 | linux | 49d31c2f389acfe83417083e1208422b4091cd9e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e | dentry name snapshots
take_dentry_name_snapshot() takes a safe snapshot of dentry name;
if the name is a short one, it gets copied into caller-supplied
structure, otherwise an extra reference to external name is grabbed
(those are never modified). In either case the pointer to stable
string is stored into the same st... | 1 | int vfs_rename(struct inode *old_dir, struct dentry *old_dentry,
struct inode *new_dir, struct dentry *new_dentry,
struct inode **delegated_inode, unsigned int flags)
{
int error;
bool is_dir = d_is_dir(old_dentry);
const unsigned char *old_name;
struct inode *source = old_dentry->d_inode;
str... | 3,742,682,420,476,444,700,000,000,000,000,000,000 | namei.c | 197,616,719,765,189,360,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-7533 | Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions. | https://nvd.nist.gov/vuln/detail/CVE-2017-7533 |
160,279 | linux | 49d31c2f389acfe83417083e1208422b4091cd9e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e | dentry name snapshots
take_dentry_name_snapshot() takes a safe snapshot of dentry name;
if the name is a short one, it gets copied into caller-supplied
structure, otherwise an extra reference to external name is grabbed
(those are never modified). In either case the pointer to stable
string is stored into the same st... | 0 | int vfs_rename(struct inode *old_dir, struct dentry *old_dentry,
struct inode *new_dir, struct dentry *new_dentry,
struct inode **delegated_inode, unsigned int flags)
{
int error;
bool is_dir = d_is_dir(old_dentry);
struct inode *source = old_dentry->d_inode;
struct inode *target = new_dentry->... | 67,361,923,694,441,430,000,000,000,000,000,000,000 | namei.c | 40,476,466,110,984,527,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-7533 | Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions. | https://nvd.nist.gov/vuln/detail/CVE-2017-7533 |
2,911 | linux | ee0d8d8482345ff97a75a7d747efc309f13b0d80 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ee0d8d8482345ff97a75a7d747efc309f13b0d80 | ipx: call ipxitf_put() in ioctl error path
We should call ipxitf_put() if the copy_to_user() fails.
Reported-by: 李强 <liqiang6-s@360.cn>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | 1 | static int ipxitf_ioctl(unsigned int cmd, void __user *arg)
{
int rc = -EINVAL;
struct ifreq ifr;
int val;
switch (cmd) {
case SIOCSIFADDR: {
struct sockaddr_ipx *sipx;
struct ipx_interface_definition f;
rc = -EFAULT;
if (copy_from_user(&ifr, arg, sizeof(ifr)))
break;
sipx = (struct sockaddr_ipx *)&... | 171,185,150,646,835,850,000,000,000,000,000,000,000 | af_ipx.c | 45,846,410,308,896,070,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-7487 | The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. | https://nvd.nist.gov/vuln/detail/CVE-2017-7487 |
160,284 | linux | ee0d8d8482345ff97a75a7d747efc309f13b0d80 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ee0d8d8482345ff97a75a7d747efc309f13b0d80 | ipx: call ipxitf_put() in ioctl error path
We should call ipxitf_put() if the copy_to_user() fails.
Reported-by: 李强 <liqiang6-s@360.cn>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int ipxitf_ioctl(unsigned int cmd, void __user *arg)
{
int rc = -EINVAL;
struct ifreq ifr;
int val;
switch (cmd) {
case SIOCSIFADDR: {
struct sockaddr_ipx *sipx;
struct ipx_interface_definition f;
rc = -EFAULT;
if (copy_from_user(&ifr, arg, sizeof(ifr)))
break;
sipx = (struct sockaddr_ipx *)&... | 151,864,850,102,795,560,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-7487 | The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. | https://nvd.nist.gov/vuln/detail/CVE-2017-7487 |
2,916 | proftpd | 349addc3be4fcdad9bd4ec01ad1ccd916c898ed8 | https://github.com/proftpd/proftpd | https://github.com/proftpd/proftpd/commit/349addc3be4fcdad9bd4ec01ad1ccd916c898ed8 | Walk the entire DefaultRoot path, checking for symlinks of any component,
when AllowChrootSymlinks is disabled. | 1 | static int get_default_root(pool *p, int allow_symlinks, const char **root) {
config_rec *c = NULL;
const char *dir = NULL;
int res;
c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE);
while (c != NULL) {
pr_signals_handle();
/* Check the groups acl */
if (c->argc < 2) {
... | 329,129,884,821,134,700,000,000,000,000,000,000,000 | mod_auth.c | 155,904,831,524,822,930,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2017-7418 | ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7418 |
160,285 | proftpd | 349addc3be4fcdad9bd4ec01ad1ccd916c898ed8 | https://github.com/proftpd/proftpd | https://github.com/proftpd/proftpd/commit/349addc3be4fcdad9bd4ec01ad1ccd916c898ed8 | Walk the entire DefaultRoot path, checking for symlinks of any component,
when AllowChrootSymlinks is disabled. | 0 | static int get_default_root(pool *p, int allow_symlinks, const char **root) {
config_rec *c = NULL;
const char *dir = NULL;
int res;
c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE);
while (c != NULL) {
pr_signals_handle();
/* Check the groups acl */
if (c->argc < 2) {
... | 33,430,469,873,354,000,000,000,000,000,000,000,000 | mod_auth.c | 53,712,744,035,877,340,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2017-7418 | ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7418 |
2,923 | radare2 | 7ab66cca5bbdf6cb2d69339ef4f513d95e532dbf | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/7ab66cca5bbdf6cb2d69339ef4f513d95e532dbf | Fix #7152 - Null deref in cms | 1 | RCMS *r_pkcs7_parse_cms (const ut8 *buffer, ut32 length) {
RASN1Object *object;
RCMS *container;
if (!buffer || !length) {
return NULL;
}
container = R_NEW0 (RCMS);
if (!container) {
return NULL;
}
object = r_asn1_create_object (buffer, length);
if (!object || object->list.length != 2 || !object->list.o... | 137,332,301,054,576,720,000,000,000,000,000,000,000 | r_pkcs7.c | 308,198,352,120,592,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-7274 | The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PE file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7274 |
160,293 | radare2 | 7ab66cca5bbdf6cb2d69339ef4f513d95e532dbf | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/7ab66cca5bbdf6cb2d69339ef4f513d95e532dbf | Fix #7152 - Null deref in cms | 0 | RCMS *r_pkcs7_parse_cms (const ut8 *buffer, ut32 length) {
RASN1Object *object;
RCMS *container;
if (!buffer || !length) {
return NULL;
}
container = R_NEW0 (RCMS);
if (!container) {
return NULL;
}
object = r_asn1_create_object (buffer, length);
if (!object || object->list.length != 2 || !object->list.o... | 83,242,632,775,142,770,000,000,000,000,000,000,000 | r_pkcs7.c | 130,413,232,395,949,990,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-7274 | The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PE file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7274 |
2,924 | linux | 1ebb71143758f45dc0fa76e2f48429e13b16d110 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110 | HID: hid-cypress: validate length of report
Make sure we have enough of a report structure to validate before
looking at it.
Reported-by: Benoit Camredon <benoit.camredon@airbus.com>
Tested-by: Benoit Camredon <benoit.camredon@airbus.com>
Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@l... | 1 | static __u8 *cp_report_fixup(struct hid_device *hdev, __u8 *rdesc,
unsigned int *rsize)
{
unsigned long quirks = (unsigned long)hid_get_drvdata(hdev);
unsigned int i;
if (!(quirks & CP_RDESC_SWAPPED_MIN_MAX))
return rdesc;
for (i = 0; i < *rsize - 4; i++)
if (rdesc[i] == 0x29 && rdesc[i + 2] == 0x19) {... | 312,370,685,237,397,730,000,000,000,000,000,000,000 | hid-cypress.c | 110,245,277,823,408,490,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-7273 | The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report. | https://nvd.nist.gov/vuln/detail/CVE-2017-7273 |
160,294 | linux | 1ebb71143758f45dc0fa76e2f48429e13b16d110 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110 | HID: hid-cypress: validate length of report
Make sure we have enough of a report structure to validate before
looking at it.
Reported-by: Benoit Camredon <benoit.camredon@airbus.com>
Tested-by: Benoit Camredon <benoit.camredon@airbus.com>
Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@l... | 0 | static __u8 *cp_report_fixup(struct hid_device *hdev, __u8 *rdesc,
unsigned int *rsize)
{
unsigned long quirks = (unsigned long)hid_get_drvdata(hdev);
unsigned int i;
if (!(quirks & CP_RDESC_SWAPPED_MIN_MAX))
return rdesc;
if (*rsize < 4)
return rdesc;
for (i = 0; i < *rsize - 4; i++)
if (rdesc[i] ... | 221,284,939,454,966,600,000,000,000,000,000,000,000 | hid-cypress.c | 169,501,954,090,658,180,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-7273 | The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report. | https://nvd.nist.gov/vuln/detail/CVE-2017-7273 |
2,941 | LibRaw-demosaic-pack-GPL2 | 194f592e205990ea8fce72b6c571c14350aca716 | https://github.com/LibRaw/LibRaw-demosaic-pack-GPL2 | https://github.com/LibRaw/LibRaw-demosaic-pack-GPL2/commit/194f592e205990ea8fce72b6c571c14350aca716 | Fixed possible foveon buffer overrun (Secunia SA750000) | 1 | void CLASS foveon_load_camf()
{
unsigned type, wide, high, i, j, row, col, diff;
ushort huff[258], vpred[2][2] = {{512,512},{512,512}}, hpred[2];
fseek (ifp, meta_offset, SEEK_SET);
type = get4(); get4(); get4();
wide = get4();
high = get4();
if (type == 2) {
fread (meta_data, 1, meta_len... | 256,409,674,907,308,300,000,000,000,000,000,000,000 | dcraw_foveon.c | 125,246,949,532,026,940,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-6890 | A boundary error within the "foveon_load_camf()" function (dcraw_foveon.c) when initializing a huffman table in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-6890 |
160,311 | LibRaw-demosaic-pack-GPL2 | 194f592e205990ea8fce72b6c571c14350aca716 | https://github.com/LibRaw/LibRaw-demosaic-pack-GPL2 | https://github.com/LibRaw/LibRaw-demosaic-pack-GPL2/commit/194f592e205990ea8fce72b6c571c14350aca716 | Fixed possible foveon buffer overrun (Secunia SA750000) | 0 | void CLASS foveon_load_camf()
{
unsigned type, wide, high, i, j, row, col, diff;
ushort huff[1024], vpred[2][2] = {{512,512},{512,512}}, hpred[2];
fseek (ifp, meta_offset, SEEK_SET);
type = get4(); get4(); get4();
wide = get4();
high = get4();
#ifdef LIBRAW_LIBRARY_BUILD
if(wide>32767 || high >... | 257,535,257,016,048,260,000,000,000,000,000,000,000 | dcraw_foveon.c | 154,171,287,928,267,010,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-6890 | A boundary error within the "foveon_load_camf()" function (dcraw_foveon.c) when initializing a huffman table in LibRaw-demosaic-pack-GPL2 before 0.18.2 can be exploited to cause a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-6890 |
2,942 | linux | 040757f738e13caaa9c5078bca79aa97e11dde88 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/040757f738e13caaa9c5078bca79aa97e11dde88 | ucount: Remove the atomicity from ucount->count
Always increment/decrement ucount->count under the ucounts_lock. The
increments are there already and moving the decrements there means the
locking logic of the code is simpler. This simplification in the
locking logic fixes a race between put_ucounts and get_ucounts t... | 1 | static struct ucounts *get_ucounts(struct user_namespace *ns, kuid_t uid)
{
struct hlist_head *hashent = ucounts_hashentry(ns, uid);
struct ucounts *ucounts, *new;
spin_lock_irq(&ucounts_lock);
ucounts = find_ucounts(ns, uid, hashent);
if (!ucounts) {
spin_unlock_irq(&ucounts_lock);
new = kzalloc(sizeof(*new... | 171,561,312,948,769,470,000,000,000,000,000,000,000 | ucount.c | 48,367,944,907,307,025,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-6874 | Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get... | https://nvd.nist.gov/vuln/detail/CVE-2017-6874 |
160,312 | linux | 040757f738e13caaa9c5078bca79aa97e11dde88 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/040757f738e13caaa9c5078bca79aa97e11dde88 | ucount: Remove the atomicity from ucount->count
Always increment/decrement ucount->count under the ucounts_lock. The
increments are there already and moving the decrements there means the
locking logic of the code is simpler. This simplification in the
locking logic fixes a race between put_ucounts and get_ucounts t... | 0 | static struct ucounts *get_ucounts(struct user_namespace *ns, kuid_t uid)
{
struct hlist_head *hashent = ucounts_hashentry(ns, uid);
struct ucounts *ucounts, *new;
spin_lock_irq(&ucounts_lock);
ucounts = find_ucounts(ns, uid, hashent);
if (!ucounts) {
spin_unlock_irq(&ucounts_lock);
new = kzalloc(sizeof(*new... | 307,432,101,996,433,300,000,000,000,000,000,000,000 | ucount.c | 158,829,112,655,061,700,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-6874 | Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get... | https://nvd.nist.gov/vuln/detail/CVE-2017-6874 |
2,943 | linux | 040757f738e13caaa9c5078bca79aa97e11dde88 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/040757f738e13caaa9c5078bca79aa97e11dde88 | ucount: Remove the atomicity from ucount->count
Always increment/decrement ucount->count under the ucounts_lock. The
increments are there already and moving the decrements there means the
locking logic of the code is simpler. This simplification in the
locking logic fixes a race between put_ucounts and get_ucounts t... | 1 | static void put_ucounts(struct ucounts *ucounts)
{
unsigned long flags;
if (atomic_dec_and_test(&ucounts->count)) {
spin_lock_irqsave(&ucounts_lock, flags);
hlist_del_init(&ucounts->node);
spin_unlock_irqrestore(&ucounts_lock, flags);
kfree(ucounts);
}
}
| 275,296,759,605,816,550,000,000,000,000,000,000,000 | ucount.c | 48,367,944,907,307,025,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-6874 | Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get... | https://nvd.nist.gov/vuln/detail/CVE-2017-6874 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.