idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
161,401 | tcpdump | 24182d959f661327525a20d9a94c98a8ec016778 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778 | (for 4.9.3) CVE-2018-16452/SMB: prevent stack exhaustion
Enforce a limit on how many times smb_fdata() can recurse.
This fixes a stack exhaustion discovered by Include Security working
under the Mozilla SOS program in 2018 by means of code audit. | 0 | smb_fdata(netdissect_options *ndo,
const u_char *buf, const char *fmt, const u_char *maxbuf,
int unicodestr)
{
static int depth = 0;
char s[128];
char *p;
while (*fmt) {
switch (*fmt) {
case '*':
fmt++;
while (buf < maxbuf) {
const u_char *buf2;
depth++;
/* Not ... | 237,989,936,860,266,460,000,000,000,000,000,000,000 | smbutil.c | 68,304,933,629,148,450,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16452 | The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion. | https://nvd.nist.gov/vuln/detail/CVE-2018-16452 |
4,164 | tcpdump | 96480ab95308cd9234b4f09b175ebf60e17792c6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6 | (for 4.9.3) SMB: Add two missing bounds checks | 1 | print_trans(netdissect_options *ndo,
const u_char *words, const u_char *data1, const u_char *buf, const u_char *maxbuf)
{
u_int bcc;
const char *f1, *f2, *f3, *f4;
const u_char *data, *param;
const u_char *w = words + 1;
int datalen, paramlen;
if (request) {
ND_TCHECK2(w[12 * 2], 2... | 290,096,538,158,812,750,000,000,000,000,000,000,000 | print-smb.c | 242,560,732,155,246,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16451 | The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN. | https://nvd.nist.gov/vuln/detail/CVE-2018-16451 |
161,402 | tcpdump | 96480ab95308cd9234b4f09b175ebf60e17792c6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6 | (for 4.9.3) SMB: Add two missing bounds checks | 0 | print_trans(netdissect_options *ndo,
const u_char *words, const u_char *data1, const u_char *buf, const u_char *maxbuf)
{
u_int bcc;
const char *f1, *f2, *f3, *f4;
const u_char *data, *param;
const u_char *w = words + 1;
int datalen, paramlen;
if (request) {
ND_TCHECK2(w[12 * 2], 2... | 323,264,750,593,672,860,000,000,000,000,000,000,000 | print-smb.c | 194,729,913,910,601,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16451 | The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN. | https://nvd.nist.gov/vuln/detail/CVE-2018-16451 |
4,165 | tcpdump | af2cf04a9394c1a56227c2289ae8da262828294a | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a | (for 4.9.3) CVE-2018-16300/BGP: prevent stack exhaustion
Enforce a limit on how many times bgp_attr_print() can recurse.
This fixes a stack exhaustion discovered by Include Security working
under the Mozilla SOS program in 2018 by means of code audit. | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
ch... | 5,230,270,584,618,741,000,000,000,000,000,000,000 | print-bgp.c | 232,531,695,120,400,940,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16300 | The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion. | https://nvd.nist.gov/vuln/detail/CVE-2018-16300 |
161,403 | tcpdump | af2cf04a9394c1a56227c2289ae8da262828294a | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a | (for 4.9.3) CVE-2018-16300/BGP: prevent stack exhaustion
Enforce a limit on how many times bgp_attr_print() can recurse.
This fixes a stack exhaustion discovered by Include Security working
under the Mozilla SOS program in 2018 by means of code audit. | 0 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len, const unsigned attr_set_level)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int... | 82,972,647,226,747,580,000,000,000,000,000,000,000 | print-bgp.c | 50,221,196,444,915,960,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16300 | The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion. | https://nvd.nist.gov/vuln/detail/CVE-2018-16300 |
4,168 | tcpdump | 211124b972e74f0da66bc8b16f181f78793e2f66 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66 | (for 4.9.3) CVE-2018-16229/DCCP: Fix printing "Timestamp" and "Timestamp Echo" options
Add some comments.
Moreover:
Put a function definition name at the beginning of the line.
(This change was ported from commit 6df4852 in the master branch.)
Ryan Ackroyd had independently identified this buffer over-read later by... | 1 | static int dccp_print_option(netdissect_options *ndo, const u_char *option, u_int hlen)
{
uint8_t optlen, i;
ND_TCHECK(*option);
if (*option >= 32) {
ND_TCHECK(*(option+1));
optlen = *(option +1);
if (optlen < 2) {
if (*option >= 128)
ND_PRINT((ndo, "CCID option %u optlen too short", *option));
... | 15,798,034,750,616,692,000,000,000,000,000,000,000 | print-dccp.c | 145,045,132,521,129,190,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16229 | The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option(). | https://nvd.nist.gov/vuln/detail/CVE-2018-16229 |
161,405 | tcpdump | 211124b972e74f0da66bc8b16f181f78793e2f66 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66 | (for 4.9.3) CVE-2018-16229/DCCP: Fix printing "Timestamp" and "Timestamp Echo" options
Add some comments.
Moreover:
Put a function definition name at the beginning of the line.
(This change was ported from commit 6df4852 in the master branch.)
Ryan Ackroyd had independently identified this buffer over-read later by... | 0 | static int dccp_print_option(netdissect_options *ndo, const u_char *option, u_int hlen)
static int
dccp_print_option(netdissect_options *ndo, const u_char *option, u_int hlen)
{
uint8_t optlen, i;
ND_TCHECK(*option);
if (*option >= 32) {
ND_TCHECK(*(option+1));
optlen = *(option +1);
if (optlen < 2) {
... | 310,668,020,270,923,670,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-16229 | The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option(). | https://nvd.nist.gov/vuln/detail/CVE-2018-16229 |
4,169 | tcpdump | 4846b3c5d0a850e860baf4f07340495d29837d09 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09 | (for 4.9.3) CVE-2018-16227/IEEE 802.11: add a missing bounds check
ieee802_11_print() tried to access the Mesh Flags subfield of the Mesh
Control field to find the size of the latter and increment the expected
802.11 header length before checking it is fully present in the input
buffer. Add an intermediate bounds chec... | 1 | ieee802_11_print(netdissect_options *ndo,
const u_char *p, u_int length, u_int orig_caplen, int pad,
u_int fcslen)
{
uint16_t fc;
u_int caplen, hdrlen, meshdrlen;
struct lladdr_info src, dst;
int llc_hdrlen;
caplen = orig_caplen;
/* Remove FCS, if present */
if (length < fcslen... | 36,678,721,672,009,150,000,000,000,000,000,000,000 | print-802_11.c | 126,620,455,302,702,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16227 | The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield. | https://nvd.nist.gov/vuln/detail/CVE-2018-16227 |
161,406 | tcpdump | 4846b3c5d0a850e860baf4f07340495d29837d09 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09 | (for 4.9.3) CVE-2018-16227/IEEE 802.11: add a missing bounds check
ieee802_11_print() tried to access the Mesh Flags subfield of the Mesh
Control field to find the size of the latter and increment the expected
802.11 header length before checking it is fully present in the input
buffer. Add an intermediate bounds chec... | 0 | ieee802_11_print(netdissect_options *ndo,
const u_char *p, u_int length, u_int orig_caplen, int pad,
u_int fcslen)
{
uint16_t fc;
u_int caplen, hdrlen, meshdrlen;
struct lladdr_info src, dst;
int llc_hdrlen;
caplen = orig_caplen;
/* Remove FCS, if present */
if (length < fcslen... | 195,654,426,211,868,870,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-16227 | The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield. | https://nvd.nist.gov/vuln/detail/CVE-2018-16227 |
4,181 | tcpdump | e01c9bf76740802025c9328901b55ee4a0c49ed6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6 | (for 4.9.3) CVE-2018-14880/OSPFv3: Fix a bounds check
Need to test bounds check for the last field of the structure lsa6_hdr.
No need to test other fields.
Include Security working under the Mozilla SOS program had independently
identified this vulnerability in 2018 by means of code audit.
Wang Junjie of 360 ESG Cod... | 1 | ospf6_print_lshdr(netdissect_options *ndo,
register const struct lsa6_hdr *lshp, const u_char *dataend)
{
if ((const u_char *)(lshp + 1) > dataend)
goto trunc;
ND_TCHECK(lshp->ls_type);
ND_TCHECK(lshp->ls_seq);
ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u",
... | 129,283,399,906,377,130,000,000,000,000,000,000,000 | print-ospf6.c | 147,818,747,608,204,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14880 | The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14880 |
161,418 | tcpdump | e01c9bf76740802025c9328901b55ee4a0c49ed6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6 | (for 4.9.3) CVE-2018-14880/OSPFv3: Fix a bounds check
Need to test bounds check for the last field of the structure lsa6_hdr.
No need to test other fields.
Include Security working under the Mozilla SOS program had independently
identified this vulnerability in 2018 by means of code audit.
Wang Junjie of 360 ESG Cod... | 0 | ospf6_print_lshdr(netdissect_options *ndo,
register const struct lsa6_hdr *lshp, const u_char *dataend)
{
if ((const u_char *)(lshp + 1) > dataend)
goto trunc;
ND_TCHECK(lshp->ls_length); /* last field of struct lsa6_hdr */
ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, l... | 262,460,743,163,383,580,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-14880 | The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14880 |
4,182 | tcpdump | 9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6 | (for 4.9.3) CVE-2018-14879/fix -V to fail invalid input safely
get_next_file() did not check the return value of strlen() and
underflowed an array index if the line read by fgets() from the file
started with \0. This caused an out-of-bounds read and could cause a
write. Add the missing check.
This vulnerability was d... | 1 | get_next_file(FILE *VFile, char *ptr)
{
char *ret;
ret = fgets(ptr, PATH_MAX, VFile);
if (!ret)
return NULL;
if (ptr[strlen(ptr) - 1] == '\n')
ptr[strlen(ptr) - 1] = '\0';
return ret;
}
| 257,347,123,511,778,800,000,000,000,000,000,000,000 | tcpdump.c | 120,937,434,841,688,800,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-14879 | The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14879 |
161,419 | tcpdump | 9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6 | (for 4.9.3) CVE-2018-14879/fix -V to fail invalid input safely
get_next_file() did not check the return value of strlen() and
underflowed an array index if the line read by fgets() from the file
started with \0. This caused an out-of-bounds read and could cause a
write. Add the missing check.
This vulnerability was d... | 0 | get_next_file(FILE *VFile, char *ptr)
{
char *ret;
size_t len;
ret = fgets(ptr, PATH_MAX, VFile);
if (!ret)
return NULL;
len = strlen (ptr);
if (len > 0 && ptr[len - 1] == '\n')
ptr[len - 1] = '\0';
return ret;
}
| 300,973,453,998,054,540,000,000,000,000,000,000,000 | tcpdump.c | 127,926,338,194,402,560,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-14879 | The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14879 |
4,183 | libjpeg-turbo | 9c78a04df4e44ef6487eee99c4258397f4fdca55 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55 | cjpeg: Fix OOB read caused by malformed 8-bit BMP
... in which one or more of the color indices is out of range for the
number of palette entries.
Fix partly borrowed from jpeg-9c. This commit also adopts Guido's
JERR_PPM_OUTOFRANGE enum value in lieu of our project-specific
JERR_PPM_TOOLARGE enum value.
Fixes #258 | 1 | METHODDEF(JDIMENSION)
get_8bit_row(j_compress_ptr cinfo, cjpeg_source_ptr sinfo)
/* This version is for reading 8-bit colormap indexes */
{
bmp_source_ptr source = (bmp_source_ptr)sinfo;
register JSAMPARRAY colormap = source->colormap;
JSAMPARRAY image_ptr;
register int t;
register JSAMPROW inptr, outpt... | 167,548,316,555,997,960,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-14498 | get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries. | https://nvd.nist.gov/vuln/detail/CVE-2018-14498 |
161,420 | libjpeg-turbo | 9c78a04df4e44ef6487eee99c4258397f4fdca55 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55 | cjpeg: Fix OOB read caused by malformed 8-bit BMP
... in which one or more of the color indices is out of range for the
number of palette entries.
Fix partly borrowed from jpeg-9c. This commit also adopts Guido's
JERR_PPM_OUTOFRANGE enum value in lieu of our project-specific
JERR_PPM_TOOLARGE enum value.
Fixes #258 | 0 | METHODDEF(JDIMENSION)
get_8bit_row(j_compress_ptr cinfo, cjpeg_source_ptr sinfo)
/* This version is for reading 8-bit colormap indexes */
{
bmp_source_ptr source = (bmp_source_ptr)sinfo;
register JSAMPARRAY colormap = source->colormap;
int cmaplen = source->cmap_length;
JSAMPARRAY image_ptr;
register int... | 156,928,935,857,965,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-14498 | get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries. | https://nvd.nist.gov/vuln/detail/CVE-2018-14498 |
4,187 | tcpdump | 12f66f69f7bf1ec1266ddbee90a7616cbf33696b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b | (for 4.9.3) CVE-2018-14470/Babel: fix an existing length check
In babel_print_v2() the non-verbose branch for an Update TLV compared
the TLV Length against 1 instead of 10 (probably a typo), put it right.
This fixes a buffer over-read discovered by Henri Salo from Nixu
Corporation.
Add a test using the capture file ... | 1 | babel_print_v2(netdissect_options *ndo,
const u_char *cp, u_int length)
{
u_int i;
u_short bodylen;
u_char v4_prefix[16] =
{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 };
u_char v6_prefix[16] = {0};
ND_TCHECK2(*cp, 4);
if (length < 4)
goto invalid;
bo... | 221,650,779,211,644,100,000,000,000,000,000,000,000 | print-babel.c | 165,395,599,757,044,750,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14470 | The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14470 |
161,424 | tcpdump | 12f66f69f7bf1ec1266ddbee90a7616cbf33696b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b | (for 4.9.3) CVE-2018-14470/Babel: fix an existing length check
In babel_print_v2() the non-verbose branch for an Update TLV compared
the TLV Length against 1 instead of 10 (probably a typo), put it right.
This fixes a buffer over-read discovered by Henri Salo from Nixu
Corporation.
Add a test using the capture file ... | 0 | babel_print_v2(netdissect_options *ndo,
const u_char *cp, u_int length)
{
u_int i;
u_short bodylen;
u_char v4_prefix[16] =
{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 };
u_char v6_prefix[16] = {0};
ND_TCHECK2(*cp, 4);
if (length < 4)
goto invalid;
bo... | 195,402,206,506,743,440,000,000,000,000,000,000,000 | print-babel.c | 241,035,243,995,317,540,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14470 | The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14470 |
4,188 | tcpdump | 396e94ff55a80d554b1fe46bf107db1e91008d6c | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c | (for 4.9.3) CVE-2018-14469/ISAKMP: Add a missing bounds check
In ikev1_n_print() check bounds before trying to fetch the replay detection
status.
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 1 | ikev1_n_print(netdissect_options *ndo, u_char tpay _U_,
const struct isakmp_gen *ext, u_int item_len,
const u_char *ep, uint32_t phase _U_, uint32_t doi0 _U_,
uint32_t proto0 _U_, int depth _U_)
{
const struct ikev1_pl_n *p;
struct ikev1_pl_n n;
const u_char *cp;
const u_char *ep2;
uint32_t do... | 234,740,568,020,028,660,000,000,000,000,000,000,000 | print-isakmp.c | 46,301,836,066,961,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14469 | The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14469 |
161,425 | tcpdump | 396e94ff55a80d554b1fe46bf107db1e91008d6c | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c | (for 4.9.3) CVE-2018-14469/ISAKMP: Add a missing bounds check
In ikev1_n_print() check bounds before trying to fetch the replay detection
status.
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 0 | ikev1_n_print(netdissect_options *ndo, u_char tpay _U_,
const struct isakmp_gen *ext, u_int item_len,
const u_char *ep, uint32_t phase _U_, uint32_t doi0 _U_,
uint32_t proto0 _U_, int depth _U_)
{
const struct ikev1_pl_n *p;
struct ikev1_pl_n n;
const u_char *cp;
const u_char *ep2;
uint32_t do... | 85,271,424,329,430,940,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-14469 | The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14469 |
4,189 | tcpdump | aa3e54f594385ce7e1e319b0c84999e51192578b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b | (for 4.9.3) CVE-2018-14468/FRF.16: Add a missing length check.
The specification says in a well-formed Magic Number information element
the data is exactly 4 bytes long. In mfr_print() check this before trying
to read those 4 bytes.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a ... | 1 | mfr_print(netdissect_options *ndo,
register const u_char *p, u_int length)
{
u_int tlen,idx,hdr_len = 0;
uint16_t sequence_num;
uint8_t ie_type,ie_len;
const uint8_t *tptr;
/*
* FRF.16 Link Integrity Control Frame
*
* 7 6 5 4 3 2 1 0
* +----+----+----+----+--... | 34,406,534,537,232,213,000,000,000,000,000,000,000 | print-fr.c | 155,609,240,038,833,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14468 | The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14468 |
161,426 | tcpdump | aa3e54f594385ce7e1e319b0c84999e51192578b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b | (for 4.9.3) CVE-2018-14468/FRF.16: Add a missing length check.
The specification says in a well-formed Magic Number information element
the data is exactly 4 bytes long. In mfr_print() check this before trying
to read those 4 bytes.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a ... | 0 | mfr_print(netdissect_options *ndo,
register const u_char *p, u_int length)
{
u_int tlen,idx,hdr_len = 0;
uint16_t sequence_num;
uint8_t ie_type,ie_len;
const uint8_t *tptr;
/*
* FRF.16 Link Integrity Control Frame
*
* 7 6 5 4 3 2 1 0
* +----+----+----+----+--... | 33,643,358,880,628,200,000,000,000,000,000,000,000 | print-fr.c | 300,604,639,786,198,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14468 | The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14468 |
4,190 | tcpdump | e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9 | (for 4.9.3) CVE-2018-14467/BGP: Fix BGP_CAPCODE_MP.
Add a bounds check and a comment to bgp_capabilities_print().
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | bgp_capabilities_print(netdissect_options *ndo,
const u_char *opt, int caps_len)
{
int cap_type, cap_len, tcap_len, cap_offset;
int i = 0;
while (i < caps_len) {
ND_TCHECK2(opt[i], BGP_CAP_HEADER_SIZE);
cap_type=opt[i];
cap_len=opt... | 48,898,273,469,995,470,000,000,000,000,000,000,000 | print-bgp.c | 102,553,564,603,133,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14467 | The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP). | https://nvd.nist.gov/vuln/detail/CVE-2018-14467 |
161,427 | tcpdump | e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9 | (for 4.9.3) CVE-2018-14467/BGP: Fix BGP_CAPCODE_MP.
Add a bounds check and a comment to bgp_capabilities_print().
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 0 | bgp_capabilities_print(netdissect_options *ndo,
const u_char *opt, int caps_len)
{
int cap_type, cap_len, tcap_len, cap_offset;
int i = 0;
while (i < caps_len) {
ND_TCHECK2(opt[i], BGP_CAP_HEADER_SIZE);
cap_type=opt[i];
cap_len=opt... | 243,525,914,459,132,230,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-14467 | The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP). | https://nvd.nist.gov/vuln/detail/CVE-2018-14467 |
4,191 | tcpdump | c24922e692a52121e853a84ead6b9337f4c08a94 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94 | (for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug
In rx_cache_insert() and rx_cache_find() properly read the serviceId
field of the rx_header structure as a 16-bit integer. When those
functions tried to read 32 bits the extra 16 bits could be outside of
the bounds checked in rx_print() for the rx_header structure, a... | 1 | rx_cache_find(const struct rx_header *rxh, const struct ip *ip, int sport,
int32_t *opcode)
{
int i;
struct rx_cache_entry *rxent;
uint32_t clip;
uint32_t sip;
UNALIGNED_MEMCPY(&clip, &ip->ip_dst, sizeof(uint32_t));
UNALIGNED_MEMCPY(&sip, &ip->ip_src, sizeof(uint32_t));
/* Start the search where we last... | 103,259,589,506,430,560,000,000,000,000,000,000,000 | print-rx.c | 87,888,529,561,150,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14466 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14466 |
161,428 | tcpdump | c24922e692a52121e853a84ead6b9337f4c08a94 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94 | (for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug
In rx_cache_insert() and rx_cache_find() properly read the serviceId
field of the rx_header structure as a 16-bit integer. When those
functions tried to read 32 bits the extra 16 bits could be outside of
the bounds checked in rx_print() for the rx_header structure, a... | 0 | rx_cache_find(const struct rx_header *rxh, const struct ip *ip, int sport,
int32_t *opcode)
{
int i;
struct rx_cache_entry *rxent;
uint32_t clip;
uint32_t sip;
UNALIGNED_MEMCPY(&clip, &ip->ip_dst, sizeof(uint32_t));
UNALIGNED_MEMCPY(&sip, &ip->ip_src, sizeof(uint32_t));
/* Start the search where we last... | 305,499,794,837,723,420,000,000,000,000,000,000,000 | print-rx.c | 228,876,252,511,165,340,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14466 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14466 |
9,637 | tcpdump | c24922e692a52121e853a84ead6b9337f4c08a94 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94 | (for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug
In rx_cache_insert() and rx_cache_find() properly read the serviceId
field of the rx_header structure as a 16-bit integer. When those
functions tried to read 32 bits the extra 16 bits could be outside of
the bounds checked in rx_print() for the rx_header structure, a... | 1 | rx_cache_insert(netdissect_options *ndo,
const u_char *bp, const struct ip *ip, int dport)
{
struct rx_cache_entry *rxent;
const struct rx_header *rxh = (const struct rx_header *) bp;
if (ndo->ndo_snapend - bp + 1 <= (int)(sizeof(struct rx_header) + sizeof(int32_t)))
return;
rxent = &rx_cache[rx... | 15,665,195,569,772,354,000,000,000,000,000,000,000 | print-rx.c | 87,888,529,561,150,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14466 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14466 |
184,705 | tcpdump | c24922e692a52121e853a84ead6b9337f4c08a94 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94 | (for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug
In rx_cache_insert() and rx_cache_find() properly read the serviceId
field of the rx_header structure as a 16-bit integer. When those
functions tried to read 32 bits the extra 16 bits could be outside of
the bounds checked in rx_print() for the rx_header structure, a... | 0 | rx_cache_insert(netdissect_options *ndo,
const u_char *bp, const struct ip *ip, int dport)
{
struct rx_cache_entry *rxent;
const struct rx_header *rxh = (const struct rx_header *) bp;
if (ndo->ndo_snapend - bp + 1 <= (int)(sizeof(struct rx_header) + sizeof(int32_t)))
return;
rxent = &rx_cache[rx... | 1,608,570,316,045,191,600,000,000,000,000,000,000 | print-rx.c | 228,876,252,511,165,340,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14466 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14466 |
4,192 | tcpdump | bea2686c296b79609060a104cc139810785b0739 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739 | (for 4.9.3) CVE-2018-14465/RSVP: Add a missing bounds check
In rsvp_obj_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 1 | rsvp_obj_print(netdissect_options *ndo,
const u_char *pptr, u_int plen, const u_char *tptr,
const char *ident, u_int tlen,
const struct rsvp_common_header *rsvp_com_header)
{
const struct rsvp_object_header *rsvp_obj_header;
const u_char *obj_tptr;
union {
... | 337,800,776,597,343,780,000,000,000,000,000,000,000 | print-rsvp.c | 309,134,377,433,343,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14465 | The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14465 |
161,429 | tcpdump | bea2686c296b79609060a104cc139810785b0739 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739 | (for 4.9.3) CVE-2018-14465/RSVP: Add a missing bounds check
In rsvp_obj_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 0 | rsvp_obj_print(netdissect_options *ndo,
const u_char *pptr, u_int plen, const u_char *tptr,
const char *ident, u_int tlen,
const struct rsvp_common_header *rsvp_com_header)
{
const struct rsvp_object_header *rsvp_obj_header;
const u_char *obj_tptr;
union {
... | 175,611,666,623,826,140,000,000,000,000,000,000,000 | print-rsvp.c | 213,736,641,813,430,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14465 | The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14465 |
4,195 | tcpdump | 3de07c772166b7e8e8bb4b9d1d078f1d901b570b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b | (for 4.9.3) CVE-2018-14463/VRRP: Add a missing bounds check
In vrrp_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 1 | vrrp_print(netdissect_options *ndo,
register const u_char *bp, register u_int len,
register const u_char *bp2, int ttl)
{
int version, type, auth_type = VRRP_AUTH_NONE; /* keep compiler happy */
const char *type_s;
ND_TCHECK(bp[0]);
version = (bp[0] & 0xf0) >> 4;
type = bp[0] & 0x0f;
type_s... | 177,267,562,973,387,440,000,000,000,000,000,000,000 | print-vrrp.c | 276,178,921,820,745,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14463 | The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167. | https://nvd.nist.gov/vuln/detail/CVE-2018-14463 |
161,430 | tcpdump | 3de07c772166b7e8e8bb4b9d1d078f1d901b570b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b | (for 4.9.3) CVE-2018-14463/VRRP: Add a missing bounds check
In vrrp_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 0 | vrrp_print(netdissect_options *ndo,
register const u_char *bp, register u_int len,
register const u_char *bp2, int ttl)
{
int version, type, auth_type = VRRP_AUTH_NONE; /* keep compiler happy */
const char *type_s;
ND_TCHECK(bp[0]);
version = (bp[0] & 0xf0) >> 4;
type = bp[0] & 0x0f;
type_s... | 176,127,102,300,423,140,000,000,000,000,000,000,000 | print-vrrp.c | 218,253,398,014,742,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14463 | The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167. | https://nvd.nist.gov/vuln/detail/CVE-2018-14463 |
4,196 | tcpdump | 1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3 | (for 4.9.3) CVE-2018-14462/ICMP: Add a missing bounds check
In icmp_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add two tests using the capture files supplied by the reporter(s). | 1 | icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2,
int fragmented)
{
char *cp;
const struct icmp *dp;
const struct icmp_ext_t *ext_dp;
const struct ip *ip;
const char *str, *fmt;
const struct ip *oip;
const struct udphdr *ouh;
const uint8_t *obj_tptr;
... | 292,921,596,680,894,330,000,000,000,000,000,000,000 | print-icmp.c | 139,842,233,616,481,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14462 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14462 |
161,431 | tcpdump | 1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3 | (for 4.9.3) CVE-2018-14462/ICMP: Add a missing bounds check
In icmp_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add two tests using the capture files supplied by the reporter(s). | 0 | icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2,
int fragmented)
{
char *cp;
const struct icmp *dp;
const struct icmp_ext_t *ext_dp;
const struct ip *ip;
const char *str, *fmt;
const struct ip *oip;
const struct udphdr *ouh;
const uint8_t *obj_tptr;
... | 225,965,720,678,931,000,000,000,000,000,000,000,000 | print-icmp.c | 142,726,008,474,011,350,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14462 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14462 |
4,198 | tcpdump | aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b | (for 4.9.3) CVE-2018-14461/LDP: Fix a bounds check
In ldp_tlv_print(), the FT Session TLV length must be 12, not 8 (RFC3479)
This fixes a buffer over-read discovered by Konrad Rieck and
Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s).
Moreover:
Add and use tstr[].
Add a comment. | 1 | ldp_tlv_print(netdissect_options *ndo,
register const u_char *tptr,
u_short msg_tlen)
{
struct ldp_tlv_header {
uint8_t type[2];
uint8_t length[2];
};
const struct ldp_tlv_header *ldp_tlv_header;
u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags;
u_char fec_t... | 175,449,531,126,840,100,000,000,000,000,000,000,000 | print-ldp.c | 199,241,510,340,081,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14461 | The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14461 |
161,433 | tcpdump | aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b | (for 4.9.3) CVE-2018-14461/LDP: Fix a bounds check
In ldp_tlv_print(), the FT Session TLV length must be 12, not 8 (RFC3479)
This fixes a buffer over-read discovered by Konrad Rieck and
Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s).
Moreover:
Add and use tstr[].
Add a comment. | 0 | ldp_tlv_print(netdissect_options *ndo,
register const u_char *tptr,
u_short msg_tlen)
{
struct ldp_tlv_header {
uint8_t type[2];
uint8_t length[2];
};
const struct ldp_tlv_header *ldp_tlv_header;
u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags;
u_char fec_t... | 135,067,467,643,654,560,000,000,000,000,000,000,000 | print-ldp.c | 211,264,538,939,016,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14461 | The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14461 |
4,200 | linux | 0ad646c81b2182f7fa67ec0c8c825e0ee165696d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d | tun: call dev_get_valid_name() before register_netdevice()
register_netdevice() could fail early when we have an invalid
dev name, in which case ->ndo_uninit() is not called. For tun
device, this is a problem because a timer etc. are already
initialized and it expects ->ndo_uninit() to clean them up.
We could move th... | 1 | static int dev_get_valid_name(struct net *net,
struct net_device *dev,
const char *name)
{
BUG_ON(!net);
if (!dev_valid_name(name))
return -EINVAL;
if (strchr(name, '%'))
return dev_alloc_name_ns(net, dev, name);
else if (__dev_get_by_name(net, name))
return -EEXIST;
else if (dev->name... | 194,124,048,216,443,300,000,000,000,000,000,000,000 | dev.c | 337,658,462,804,777,840,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7191 | In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. | https://nvd.nist.gov/vuln/detail/CVE-2018-7191 |
161,434 | linux | 0ad646c81b2182f7fa67ec0c8c825e0ee165696d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d | tun: call dev_get_valid_name() before register_netdevice()
register_netdevice() could fail early when we have an invalid
dev name, in which case ->ndo_uninit() is not called. For tun
device, this is a problem because a timer etc. are already
initialized and it expects ->ndo_uninit() to clean them up.
We could move th... | 0 | static int dev_get_valid_name(struct net *net,
int dev_get_valid_name(struct net *net, struct net_device *dev,
const char *name)
{
BUG_ON(!net);
if (!dev_valid_name(name))
return -EINVAL;
if (strchr(name, '%'))
return dev_alloc_name_ns(net, dev, name);
else if (__dev_get_by_name(net, name))
retu... | 122,820,669,824,427,300,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-7191 | In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. | https://nvd.nist.gov/vuln/detail/CVE-2018-7191 |
4,203 | linux | 0c319d3a144d4b8f1ea2047fd614d2149b68f889 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0c319d3a144d4b8f1ea2047fd614d2149b68f889 | nvmet-fc: ensure target queue id within range.
When searching for queue id's ensure they are within the expected range.
Signed-off-by: James Smart <james.smart@broadcom.com>
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Jens Axboe <axboe@kernel.dk> | 1 | nvmet_fc_find_target_queue(struct nvmet_fc_tgtport *tgtport,
u64 connection_id)
{
struct nvmet_fc_tgt_assoc *assoc;
struct nvmet_fc_tgt_queue *queue;
u64 association_id = nvmet_fc_getassociationid(connection_id);
u16 qid = nvmet_fc_getqueueid(connection_id);
unsigned long flags;
spin_lock_irqsave(&tgtpor... | 185,335,558,178,742,060,000,000,000,000,000,000,000 | fc.c | 272,260,028,181,561,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-18379 | In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18379 |
161,438 | linux | 0c319d3a144d4b8f1ea2047fd614d2149b68f889 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0c319d3a144d4b8f1ea2047fd614d2149b68f889 | nvmet-fc: ensure target queue id within range.
When searching for queue id's ensure they are within the expected range.
Signed-off-by: James Smart <james.smart@broadcom.com>
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Jens Axboe <axboe@kernel.dk> | 0 | nvmet_fc_find_target_queue(struct nvmet_fc_tgtport *tgtport,
u64 connection_id)
{
struct nvmet_fc_tgt_assoc *assoc;
struct nvmet_fc_tgt_queue *queue;
u64 association_id = nvmet_fc_getassociationid(connection_id);
u16 qid = nvmet_fc_getqueueid(connection_id);
unsigned long flags;
if (qid > NVMET_NR_QUEUES)... | 252,692,076,877,611,700,000,000,000,000,000,000,000 | fc.c | 270,243,047,878,767,240,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-18379 | In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18379 |
4,204 | linux | 6aeb75e6adfaed16e58780309613a578fe1ee90b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b | USB: serial: io_ti: fix div-by-zero in set_termios
Fix a division-by-zero in set_termios when debugging is enabled and a
high-enough speed has been requested so that the divisor value becomes
zero.
Instead of just fixing the offending debug statement, cap the baud rate
at the base as a zero divisor value also appears... | 1 | static void change_port_settings(struct tty_struct *tty,
struct edgeport_port *edge_port, struct ktermios *old_termios)
{
struct device *dev = &edge_port->port->dev;
struct ump_uart_config *config;
int baud;
unsigned cflag;
int status;
int port_number = edge_port->port->port_number;
config = kmalloc (sizeof (... | 2,899,605,228,826,136,000,000,000,000,000,000,000 | io_ti.c | 311,416,253,777,553,600,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2017-18360 | In change_port_settings in drivers/usb/serial/io_ti.c in the Linux kernel before 4.11.3, local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates. | https://nvd.nist.gov/vuln/detail/CVE-2017-18360 |
161,439 | linux | 6aeb75e6adfaed16e58780309613a578fe1ee90b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b | USB: serial: io_ti: fix div-by-zero in set_termios
Fix a division-by-zero in set_termios when debugging is enabled and a
high-enough speed has been requested so that the divisor value becomes
zero.
Instead of just fixing the offending debug statement, cap the baud rate
at the base as a zero divisor value also appears... | 0 | static void change_port_settings(struct tty_struct *tty,
struct edgeport_port *edge_port, struct ktermios *old_termios)
{
struct device *dev = &edge_port->port->dev;
struct ump_uart_config *config;
int baud;
unsigned cflag;
int status;
int port_number = edge_port->port->port_number;
config = kmalloc (sizeof (... | 149,768,458,206,577,850,000,000,000,000,000,000,000 | io_ti.c | 209,213,612,982,636,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2017-18360 | In change_port_settings in drivers/usb/serial/io_ti.c in the Linux kernel before 4.11.3, local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates. | https://nvd.nist.gov/vuln/detail/CVE-2017-18360 |
4,205 | linux | 193e87143c290ec16838f5368adc0e0bc94eb931 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/193e87143c290ec16838f5368adc0e0bc94eb931 | mtd: spi-nor: Off by one in cqspi_setup_flash()
There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the >
should be >=.
Fixes: 140623410536 ('mtd: spi-nor: Add driver for Cadence Quad SPI Flash Controller')
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Marek Vasut <marex@denx.de>
... | 1 | static int cqspi_setup_flash(struct cqspi_st *cqspi, struct device_node *np)
{
struct platform_device *pdev = cqspi->pdev;
struct device *dev = &pdev->dev;
struct cqspi_flash_pdata *f_pdata;
struct spi_nor *nor;
struct mtd_info *mtd;
unsigned int cs;
int i, ret;
/* Get flash device data */
for_each_available_... | 186,302,357,406,260,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10764 | In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead. | https://nvd.nist.gov/vuln/detail/CVE-2016-10764 |
161,440 | linux | 193e87143c290ec16838f5368adc0e0bc94eb931 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/193e87143c290ec16838f5368adc0e0bc94eb931 | mtd: spi-nor: Off by one in cqspi_setup_flash()
There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the >
should be >=.
Fixes: 140623410536 ('mtd: spi-nor: Add driver for Cadence Quad SPI Flash Controller')
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Marek Vasut <marex@denx.de>
... | 0 | static int cqspi_setup_flash(struct cqspi_st *cqspi, struct device_node *np)
{
struct platform_device *pdev = cqspi->pdev;
struct device *dev = &pdev->dev;
struct cqspi_flash_pdata *f_pdata;
struct spi_nor *nor;
struct mtd_info *mtd;
unsigned int cs;
int i, ret;
/* Get flash device data */
for_each_available_... | 245,360,767,165,561,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10764 | In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead. | https://nvd.nist.gov/vuln/detail/CVE-2016-10764 |
4,206 | cJSON | 94df772485c92866ca417d92137747b2e3b0a917 | https://github.com/DaveGamble/cJSON | https://github.com/DaveGamble/cJSON/commit/94df772485c92866ca417d92137747b2e3b0a917 | fix buffer overflow (#30) | 1 | static const char *parse_string(cJSON *item,const char *str,const char **ep)
{
const char *ptr=str+1,*end_ptr=str+1;char *ptr2;char *out;int len=0;unsigned uc,uc2;
if (*str!='\"') {*ep=str;return 0;} /* not a string! */
while (*end_ptr!='\"' && *end_ptr && ++len) if (*end_ptr++ == '\\') end_ptr++; /* Skip escaped... | 118,463,785,809,405,890,000,000,000,000,000,000,000 | cjson.c | 284,722,214,602,097,060,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10749 | parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character. | https://nvd.nist.gov/vuln/detail/CVE-2016-10749 |
161,441 | cJSON | 94df772485c92866ca417d92137747b2e3b0a917 | https://github.com/DaveGamble/cJSON | https://github.com/DaveGamble/cJSON/commit/94df772485c92866ca417d92137747b2e3b0a917 | fix buffer overflow (#30) | 0 | static const char *parse_string(cJSON *item,const char *str,const char **ep)
{
const char *ptr=str+1,*end_ptr=str+1;char *ptr2;char *out;int len=0;unsigned uc,uc2;
if (*str!='\"') {*ep=str;return 0;} /* not a string! */
while (*end_ptr!='\"' && *end_ptr && ++len)
{
if (*end_ptr++ == '\\')
{
if (*end... | 143,987,429,980,608,610,000,000,000,000,000,000,000 | cJSON.c | 55,000,029,851,855,410,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10749 | parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character. | https://nvd.nist.gov/vuln/detail/CVE-2016-10749 |
4,207 | libvirt | 506e9d6c2d4baaf580d489fff0690c0ff2ff588f | https://github.com/libvirt/libvirt | https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f | virDomainGetTime: Deny on RO connections
We have a policy that if API may end up talking to a guest agent
it should require RW connection. We don't obey the rule in
virDomainGetTime().
Signed-off-by: Michal Privoznik <mprivozn@redhat.com> | 1 | virDomainGetTime(virDomainPtr dom,
long long *seconds,
unsigned int *nseconds,
unsigned int flags)
{
VIR_DOMAIN_DEBUG(dom, "seconds=%p, nseconds=%p, flags=%x",
seconds, nseconds, flags);
virResetLastError();
virCheckDomainReturn(do... | 207,738,922,790,026,470,000,000,000,000,000,000,000 | libvirt-domain.c | 330,174,055,389,131,060,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2016-10746 | libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886. | https://nvd.nist.gov/vuln/detail/CVE-2016-10746 |
161,442 | libvirt | 506e9d6c2d4baaf580d489fff0690c0ff2ff588f | https://github.com/libvirt/libvirt | https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f | virDomainGetTime: Deny on RO connections
We have a policy that if API may end up talking to a guest agent
it should require RW connection. We don't obey the rule in
virDomainGetTime().
Signed-off-by: Michal Privoznik <mprivozn@redhat.com> | 0 | virDomainGetTime(virDomainPtr dom,
long long *seconds,
unsigned int *nseconds,
unsigned int flags)
{
VIR_DOMAIN_DEBUG(dom, "seconds=%p, nseconds=%p, flags=%x",
seconds, nseconds, flags);
virResetLastError();
virCheckDomainReturn(do... | 338,702,719,205,075,140,000,000,000,000,000,000,000 | libvirt-domain.c | 187,484,556,104,525,900,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2016-10746 | libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886. | https://nvd.nist.gov/vuln/detail/CVE-2016-10746 |
4,208 | linux | 1fa2337a315a2448c5434f41e00d56b01a22283c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c | [media] cx24116: fix a buffer overflow when checking userspace params
The maximum size for a DiSEqC command is 6, according to the
userspace API. However, the code allows to write up much more values:
drivers/media/dvb-frontends/cx24116.c:983 cx24116_send_diseqc_msg() error: buffer overflow 'd->msg' 6 <= 23
Cc: stab... | 1 | static int cx24116_send_diseqc_msg(struct dvb_frontend *fe,
struct dvb_diseqc_master_cmd *d)
{
struct cx24116_state *state = fe->demodulator_priv;
int i, ret;
/* Dump DiSEqC message */
if (debug) {
printk(KERN_INFO "cx24116: %s(", __func__);
for (i = 0 ; i < d->msg_len ;) {
printk(KERN_INFO "0x%02x",... | 191,512,209,927,685,670,000,000,000,000,000,000,000 | cx24116.c | 85,302,384,688,479,090,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-9289 | In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23. | https://nvd.nist.gov/vuln/detail/CVE-2015-9289 |
161,444 | linux | 1fa2337a315a2448c5434f41e00d56b01a22283c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c | [media] cx24116: fix a buffer overflow when checking userspace params
The maximum size for a DiSEqC command is 6, according to the
userspace API. However, the code allows to write up much more values:
drivers/media/dvb-frontends/cx24116.c:983 cx24116_send_diseqc_msg() error: buffer overflow 'd->msg' 6 <= 23
Cc: stab... | 0 | static int cx24116_send_diseqc_msg(struct dvb_frontend *fe,
struct dvb_diseqc_master_cmd *d)
{
struct cx24116_state *state = fe->demodulator_priv;
int i, ret;
/* Validate length */
if (d->msg_len > sizeof(d->msg))
return -EINVAL;
/* Dump DiSEqC message */
if (debug) {
printk(KERN_INFO "... | 123,334,804,298,324,190,000,000,000,000,000,000,000 | cx24116.c | 54,194,531,740,695,985,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-9289 | In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23. | https://nvd.nist.gov/vuln/detail/CVE-2015-9289 |
4,211 | linux | 12f09ccb4612734a53e47ed5302e0479c10a50f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12f09ccb4612734a53e47ed5302e0479c10a50f8 | loopback: off by one in tcm_loop_make_naa_tpg()
This is an off by one 'tgpt' check in tcm_loop_make_naa_tpg() that could result
in memory corruption.
Signed-off-by: Dan Carpenter <error27@gmail.com>
Signed-off-by: Nicholas A. Bellinger <nab@linux-iscsi.org> | 1 | struct se_portal_group *tcm_loop_make_naa_tpg(
struct se_wwn *wwn,
struct config_group *group,
const char *name)
{
struct tcm_loop_hba *tl_hba = container_of(wwn,
struct tcm_loop_hba, tl_hba_wwn);
struct tcm_loop_tpg *tl_tpg;
char *tpgt_str, *end_ptr;
int ret;
unsigned short int tpgt;
tpgt_str = strstr(nam... | 173,887,909,380,776,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-5327 | In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption. | https://nvd.nist.gov/vuln/detail/CVE-2011-5327 |
161,447 | linux | 12f09ccb4612734a53e47ed5302e0479c10a50f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12f09ccb4612734a53e47ed5302e0479c10a50f8 | loopback: off by one in tcm_loop_make_naa_tpg()
This is an off by one 'tgpt' check in tcm_loop_make_naa_tpg() that could result
in memory corruption.
Signed-off-by: Dan Carpenter <error27@gmail.com>
Signed-off-by: Nicholas A. Bellinger <nab@linux-iscsi.org> | 0 | struct se_portal_group *tcm_loop_make_naa_tpg(
struct se_wwn *wwn,
struct config_group *group,
const char *name)
{
struct tcm_loop_hba *tl_hba = container_of(wwn,
struct tcm_loop_hba, tl_hba_wwn);
struct tcm_loop_tpg *tl_tpg;
char *tpgt_str, *end_ptr;
int ret;
unsigned short int tpgt;
tpgt_str = strstr(nam... | 41,980,886,433,094,705,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-5327 | In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption. | https://nvd.nist.gov/vuln/detail/CVE-2011-5327 |
4,212 | linux | 0926f91083f34d047abc74f1ca4fa6a9c161f7db | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db | mlx4_en: Fix out of bounds array access
When searching for a free entry in either mlx4_register_vlan() or
mlx4_register_mac(), and there is no free entry, the loop terminates without
updating the local variable free thus causing out of array bounds access. Fix
this by adding a proper check outside the loop.
Signed-of... | 1 | int mlx4_register_mac(struct mlx4_dev *dev, u8 port, u64 mac, int *index)
{
struct mlx4_mac_table *table = &mlx4_priv(dev)->port[port].mac_table;
int i, err = 0;
int free = -1;
mlx4_dbg(dev, "Registering MAC: 0x%llx\n", (unsigned long long) mac);
mutex_lock(&table->mutex);
for (i = 0; i < MLX4_MAX_MAC_NUM - 1; i... | 334,432,146,822,531,400,000,000,000,000,000,000,000 | port.c | 320,353,152,093,700,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5332 | In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. | https://nvd.nist.gov/vuln/detail/CVE-2010-5332 |
161,448 | linux | 0926f91083f34d047abc74f1ca4fa6a9c161f7db | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db | mlx4_en: Fix out of bounds array access
When searching for a free entry in either mlx4_register_vlan() or
mlx4_register_mac(), and there is no free entry, the loop terminates without
updating the local variable free thus causing out of array bounds access. Fix
this by adding a proper check outside the loop.
Signed-of... | 0 | int mlx4_register_mac(struct mlx4_dev *dev, u8 port, u64 mac, int *index)
{
struct mlx4_mac_table *table = &mlx4_priv(dev)->port[port].mac_table;
int i, err = 0;
int free = -1;
mlx4_dbg(dev, "Registering MAC: 0x%llx\n", (unsigned long long) mac);
mutex_lock(&table->mutex);
for (i = 0; i < MLX4_MAX_MAC_NUM - 1; i... | 333,418,765,870,534,430,000,000,000,000,000,000,000 | port.c | 191,486,405,513,700,860,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5332 | In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. | https://nvd.nist.gov/vuln/detail/CVE-2010-5332 |
4,213 | linux | 0926f91083f34d047abc74f1ca4fa6a9c161f7db | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db | mlx4_en: Fix out of bounds array access
When searching for a free entry in either mlx4_register_vlan() or
mlx4_register_mac(), and there is no free entry, the loop terminates without
updating the local variable free thus causing out of array bounds access. Fix
this by adding a proper check outside the loop.
Signed-of... | 1 | int mlx4_register_vlan(struct mlx4_dev *dev, u8 port, u16 vlan, int *index)
{
struct mlx4_vlan_table *table = &mlx4_priv(dev)->port[port].vlan_table;
int i, err = 0;
int free = -1;
mutex_lock(&table->mutex);
for (i = MLX4_VLAN_REGULAR; i < MLX4_MAX_VLAN_NUM; i++) {
if (free < 0 && (table->refs[i] == 0)) {
fr... | 152,912,856,707,100,740,000,000,000,000,000,000,000 | port.c | 320,353,152,093,700,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5332 | In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. | https://nvd.nist.gov/vuln/detail/CVE-2010-5332 |
161,449 | linux | 0926f91083f34d047abc74f1ca4fa6a9c161f7db | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db | mlx4_en: Fix out of bounds array access
When searching for a free entry in either mlx4_register_vlan() or
mlx4_register_mac(), and there is no free entry, the loop terminates without
updating the local variable free thus causing out of array bounds access. Fix
this by adding a proper check outside the loop.
Signed-of... | 0 | int mlx4_register_vlan(struct mlx4_dev *dev, u8 port, u16 vlan, int *index)
{
struct mlx4_vlan_table *table = &mlx4_priv(dev)->port[port].vlan_table;
int i, err = 0;
int free = -1;
mutex_lock(&table->mutex);
for (i = MLX4_VLAN_REGULAR; i < MLX4_MAX_VLAN_NUM; i++) {
if (free < 0 && (table->refs[i] == 0)) {
fr... | 143,943,949,077,209,150,000,000,000,000,000,000,000 | port.c | 191,486,405,513,700,860,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5332 | In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. | https://nvd.nist.gov/vuln/detail/CVE-2010-5332 |
4,214 | linux | 0031c41be5c529f8329e327b63cde92ba1284842 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0031c41be5c529f8329e327b63cde92ba1284842 | drivers/gpu/drm/radeon/radeon_atombios.c: range check issues
This change makes the array larger, "MAX_SUPPORTED_TV_TIMING_V1_2" is 3
and the original size "MAX_SUPPORTED_TV_TIMING" is 2.
Also there were checks that were off by one.
Signed-off-by: Dan Carpenter <error27@gmail.com>
Acked-by: Alex Deucher <alexdeucher@... | 1 | bool radeon_atom_get_tv_timings(struct radeon_device *rdev, int index,
struct drm_display_mode *mode)
{
struct radeon_mode_info *mode_info = &rdev->mode_info;
ATOM_ANALOG_TV_INFO *tv_info;
ATOM_ANALOG_TV_INFO_V1_2 *tv_info_v1_2;
ATOM_DTD_FORMAT *dtd_timings;
int data_index = GetIndexIntoMasterTable(DATA, Analo... | 235,165,537,631,957,300,000,000,000,000,000,000,000 | radeon_atombios.c | 10,244,202,857,860,056,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5331 | In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where i... | https://nvd.nist.gov/vuln/detail/CVE-2010-5331 |
161,450 | linux | 0031c41be5c529f8329e327b63cde92ba1284842 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0031c41be5c529f8329e327b63cde92ba1284842 | drivers/gpu/drm/radeon/radeon_atombios.c: range check issues
This change makes the array larger, "MAX_SUPPORTED_TV_TIMING_V1_2" is 3
and the original size "MAX_SUPPORTED_TV_TIMING" is 2.
Also there were checks that were off by one.
Signed-off-by: Dan Carpenter <error27@gmail.com>
Acked-by: Alex Deucher <alexdeucher@... | 0 | bool radeon_atom_get_tv_timings(struct radeon_device *rdev, int index,
struct drm_display_mode *mode)
{
struct radeon_mode_info *mode_info = &rdev->mode_info;
ATOM_ANALOG_TV_INFO *tv_info;
ATOM_ANALOG_TV_INFO_V1_2 *tv_info_v1_2;
ATOM_DTD_FORMAT *dtd_timings;
int data_index = GetIndexIntoMasterTable(DATA, Analo... | 89,642,805,112,366,100,000,000,000,000,000,000,000 | radeon_atombios.c | 242,775,757,981,871,350,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5331 | In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where i... | https://nvd.nist.gov/vuln/detail/CVE-2010-5331 |
4,215 | linux | 2a2f11c227bdf292b3a2900ad04139d301b56ac4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4 | NetLabel: correct CIPSO tag handling when adding new DOI definitions
The current netlbl_cipsov4_add_common() function has two problems which are
fixed with this patch. The first is an off-by-one bug where it is possibile to
overflow the doi_def->tags[] array. The second is a bug where the same
doi_def->tags[] array ... | 1 | static int netlbl_cipsov4_add_common(struct genl_info *info,
struct cipso_v4_doi *doi_def)
{
struct nlattr *nla;
int nla_rem;
u32 iter = 0;
doi_def->doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]);
if (nla_validate_nested(info->attrs[NLBL_CIPSOV4_A_TAGLST],
NLBL_CIPSOV4_A_MAX,
netlbl_cipsov4_... | 185,225,743,962,151,470,000,000,000,000,000,000,000 | netlabel_cipso_v4.c | 9,839,229,491,276,271,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2007-6762 | In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array. | https://nvd.nist.gov/vuln/detail/CVE-2007-6762 |
161,451 | linux | 2a2f11c227bdf292b3a2900ad04139d301b56ac4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4 | NetLabel: correct CIPSO tag handling when adding new DOI definitions
The current netlbl_cipsov4_add_common() function has two problems which are
fixed with this patch. The first is an off-by-one bug where it is possibile to
overflow the doi_def->tags[] array. The second is a bug where the same
doi_def->tags[] array ... | 0 | static int netlbl_cipsov4_add_common(struct genl_info *info,
struct cipso_v4_doi *doi_def)
{
struct nlattr *nla;
int nla_rem;
u32 iter = 0;
doi_def->doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]);
if (nla_validate_nested(info->attrs[NLBL_CIPSOV4_A_TAGLST],
NLBL_CIPSOV4_A_MAX,
netlbl_cipsov4_... | 44,500,367,975,991,080,000,000,000,000,000,000,000 | netlabel_cipso_v4.c | 241,808,617,688,987,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2007-6762 | In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array. | https://nvd.nist.gov/vuln/detail/CVE-2007-6762 |
4,217 | linux | 1df2ae31c724e57be9d7ac00d78db8a5dabdd050 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1df2ae31c724e57be9d7ac00d78db8a5dabdd050 | udf: Fortify loading of sparing table
Add sanity checks when loading sparing table from disk to avoid accessing
unallocated memory or writing to it.
Signed-off-by: Jan Kara <jack@suse.cz> | 1 | static int udf_load_logicalvol(struct super_block *sb, sector_t block,
struct kernel_lb_addr *fileset)
{
struct logicalVolDesc *lvd;
int i, j, offset;
uint8_t type;
struct udf_sb_info *sbi = UDF_SB(sb);
struct genericPartitionMap *gpm;
uint16_t ident;
struct buffer_head *bh;
unsigned int table_... | 203,586,019,560,546,920,000,000,000,000,000,000,000 | super.c | 167,850,010,728,400,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-3400 | Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2012-3400 |
161,452 | linux | 1df2ae31c724e57be9d7ac00d78db8a5dabdd050 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1df2ae31c724e57be9d7ac00d78db8a5dabdd050 | udf: Fortify loading of sparing table
Add sanity checks when loading sparing table from disk to avoid accessing
unallocated memory or writing to it.
Signed-off-by: Jan Kara <jack@suse.cz> | 0 | static int udf_load_logicalvol(struct super_block *sb, sector_t block,
struct kernel_lb_addr *fileset)
{
struct logicalVolDesc *lvd;
int i, offset;
uint8_t type;
struct udf_sb_info *sbi = UDF_SB(sb);
struct genericPartitionMap *gpm;
uint16_t ident;
struct buffer_head *bh;
unsigned int table_len... | 42,715,779,362,076,580,000,000,000,000,000,000,000 | super.c | 330,692,185,936,405,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-3400 | Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2012-3400 |
4,223 | linux | 093019cf1b18dd31b2c3b77acce4e000e2cbc9ce | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce | xfs: fix acl count validation in xfs_acl_from_disk()
Commit fa8b18ed didn't prevent the integer overflow and possible
memory corruption. "count" can go negative and bypass the check.
Signed-off-by: Xi Wang <xi.wang@gmail.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 1 | xfs_acl_from_disk(struct xfs_acl *aclp)
{
struct posix_acl_entry *acl_e;
struct posix_acl *acl;
struct xfs_acl_entry *ace;
int count, i;
count = be32_to_cpu(aclp->acl_cnt);
if (count > XFS_ACL_MAX_ENTRIES)
return ERR_PTR(-EFSCORRUPTED);
acl = posix_acl_alloc(count, GFP_KERNEL);
if (!acl)
return ERR_... | 338,872,511,102,859,500,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
161,457 | linux | 093019cf1b18dd31b2c3b77acce4e000e2cbc9ce | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce | xfs: fix acl count validation in xfs_acl_from_disk()
Commit fa8b18ed didn't prevent the integer overflow and possible
memory corruption. "count" can go negative and bypass the check.
Signed-off-by: Xi Wang <xi.wang@gmail.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 0 | xfs_acl_from_disk(struct xfs_acl *aclp)
{
struct posix_acl_entry *acl_e;
struct posix_acl *acl;
struct xfs_acl_entry *ace;
unsigned int count, i;
count = be32_to_cpu(aclp->acl_cnt);
if (count > XFS_ACL_MAX_ENTRIES)
return ERR_PTR(-EFSCORRUPTED);
acl = posix_acl_alloc(count, GFP_KERNEL);
if (!acl)
re... | 180,034,737,087,154,580,000,000,000,000,000,000,000 | xfs_acl.c | 96,796,582,111,495,510,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
4,227 | linux | e40f193f5bb022e927a57a4f5d5194e4f12ddb74 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e40f193f5bb022e927a57a4f5d5194e4f12ddb74 | KVM: Fix iommu map/unmap to handle memory slot moves
The iommu integration into memory slots expects memory slots to be
added or removed and doesn't handle the move case. We can unmap
slots from the iommu after we mark them invalid and map them before
installing the final memslot array. Also re-order the kmemdup vs
... | 1 | int __kvm_set_memory_region(struct kvm *kvm,
struct kvm_userspace_memory_region *mem,
int user_alloc)
{
int r;
gfn_t base_gfn;
unsigned long npages;
struct kvm_memory_slot *memslot, *slot;
struct kvm_memory_slot old, new;
struct kvm_memslots *slots, *old_memslots;
r = check_memory_region_flags(mem... | 42,039,554,948,212,130,000,000,000,000,000,000,000 | kvm_main.c | 289,658,061,896,194,840,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
161,461 | linux | e40f193f5bb022e927a57a4f5d5194e4f12ddb74 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e40f193f5bb022e927a57a4f5d5194e4f12ddb74 | KVM: Fix iommu map/unmap to handle memory slot moves
The iommu integration into memory slots expects memory slots to be
added or removed and doesn't handle the move case. We can unmap
slots from the iommu after we mark them invalid and map them before
installing the final memslot array. Also re-order the kmemdup vs
... | 0 | int __kvm_set_memory_region(struct kvm *kvm,
struct kvm_userspace_memory_region *mem,
int user_alloc)
{
int r;
gfn_t base_gfn;
unsigned long npages;
struct kvm_memory_slot *memslot, *slot;
struct kvm_memory_slot old, new;
struct kvm_memslots *slots, *old_memslots;
r = check_memory_region_flags(mem... | 138,938,812,571,200,020,000,000,000,000,000,000,000 | kvm_main.c | 41,310,256,724,402,003,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
4,230 | linux | e3211c120a85b792978bcb4be7b2886df18d27f0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0 | userns: Check uid_map's opener's fsuid, not the current fsuid
Signed-off-by: Andy Lutomirski <luto@amacapital.net> | 1 | static bool new_idmap_permitted(const struct file *file,
struct user_namespace *ns, int cap_setid,
struct uid_gid_map *new_map)
{
/* Allow mapping to your own filesystem ids */
if ((new_map->nr_extents == 1) && (new_map->extent[0].count == 1)) {
u32 id = new_map->extent[0].lower_first;
if (cap_setid ==... | 42,581,331,517,218,380,000,000,000,000,000,000,000 | user_namespace.c | 170,014,386,278,445,950,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-1959 | kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. | https://nvd.nist.gov/vuln/detail/CVE-2013-1959 |
161,462 | linux | e3211c120a85b792978bcb4be7b2886df18d27f0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0 | userns: Check uid_map's opener's fsuid, not the current fsuid
Signed-off-by: Andy Lutomirski <luto@amacapital.net> | 0 | static bool new_idmap_permitted(const struct file *file,
struct user_namespace *ns, int cap_setid,
struct uid_gid_map *new_map)
{
/* Allow mapping to your own filesystem ids */
if ((new_map->nr_extents == 1) && (new_map->extent[0].count == 1)) {
u32 id = new_map->extent[0].lower_first;
if (cap_setid ==... | 246,362,475,286,478,800,000,000,000,000,000,000,000 | user_namespace.c | 98,994,324,473,258,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-1959 | kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. | https://nvd.nist.gov/vuln/detail/CVE-2013-1959 |
4,231 | linux | 3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a | atm: fix info leak via getsockname()
The ATM code fails to initialize the two padding bytes of struct
sockaddr_atmpvc inserted for alignment. Add an explicit memset(0)
before filling the structure to avoid the info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: David S. Miller <davem@dave... | 1 | static int pvc_getname(struct socket *sock, struct sockaddr *sockaddr,
int *sockaddr_len, int peer)
{
struct sockaddr_atmpvc *addr;
struct atm_vcc *vcc = ATM_SD(sock);
if (!vcc->dev || !test_bit(ATM_VF_ADDR, &vcc->flags))
return -ENOTCONN;
*sockaddr_len = sizeof(struct sockaddr_atmpvc);
addr = (stru... | 86,538,267,407,615,000,000,000,000,000,000,000,000 | pvc.c | 132,442,317,636,064,100,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6546 | The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6546 |
161,463 | linux | 3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a | atm: fix info leak via getsockname()
The ATM code fails to initialize the two padding bytes of struct
sockaddr_atmpvc inserted for alignment. Add an explicit memset(0)
before filling the structure to avoid the info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: David S. Miller <davem@dave... | 0 | static int pvc_getname(struct socket *sock, struct sockaddr *sockaddr,
int *sockaddr_len, int peer)
{
struct sockaddr_atmpvc *addr;
struct atm_vcc *vcc = ATM_SD(sock);
if (!vcc->dev || !test_bit(ATM_VF_ADDR, &vcc->flags))
return -ENOTCONN;
*sockaddr_len = sizeof(struct sockaddr_atmpvc);
addr = (stru... | 4,263,777,574,169,177,400,000,000,000,000,000,000 | pvc.c | 139,978,500,286,001,630,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6546 | The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6546 |
4,233 | linux | 792039c73cf176c8e39a6e8beef2c94ff46522ed | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed | Bluetooth: L2CAP - Fix info leak via getsockname()
The L2CAP code fails to initialize the l2_bdaddr_type member of struct
sockaddr_l2 and the padding byte added for alignment. It that for leaks
two bytes kernel stack via the getsockname() syscall. Add an explicit
memset(0) before filling the structure to avoid the inf... | 1 | static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
struct sock *sk = sock->sk;
struct l2cap_chan *chan = l2cap_pi(sk)->chan;
BT_DBG("sock %p, sk %p", sock, sk);
addr->sa_family = AF_BLUETOOTH;
*len = sizeof(s... | 34,986,358,148,467,107,000,000,000,000,000,000,000 | l2cap_sock.c | 15,566,378,726,684,005,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6544 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | https://nvd.nist.gov/vuln/detail/CVE-2012-6544 |
161,464 | linux | 792039c73cf176c8e39a6e8beef2c94ff46522ed | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed | Bluetooth: L2CAP - Fix info leak via getsockname()
The L2CAP code fails to initialize the l2_bdaddr_type member of struct
sockaddr_l2 and the padding byte added for alignment. It that for leaks
two bytes kernel stack via the getsockname() syscall. Add an explicit
memset(0) before filling the structure to avoid the inf... | 0 | static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
struct sock *sk = sock->sk;
struct l2cap_chan *chan = l2cap_pi(sk)->chan;
BT_DBG("sock %p, sk %p", sock, sk);
memset(la, 0, sizeof(struct sockaddr_l2));
addr-... | 22,786,097,316,487,005,000,000,000,000,000,000,000 | l2cap_sock.c | 221,256,540,446,677,880,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6544 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | https://nvd.nist.gov/vuln/detail/CVE-2012-6544 |
4,234 | linux | 3f68ba07b1da811bf383b4b701b129bfcb2e4988 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3f68ba07b1da811bf383b4b701b129bfcb2e4988 | Bluetooth: HCI - Fix info leak via getsockname()
The HCI code fails to initialize the hci_channel member of struct
sockaddr_hci and that for leaks two bytes kernel stack via the
getsockname() syscall. Initialize hci_channel with 0 to avoid the
info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Marc... | 1 | static int hci_sock_getname(struct socket *sock, struct sockaddr *addr,
int *addr_len, int peer)
{
struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
struct sock *sk = sock->sk;
struct hci_dev *hdev = hci_pi(sk)->hdev;
BT_DBG("sock %p sk %p", sock, sk);
if (!hdev)
return -EBADFD;
lock_sock(sk)... | 40,232,294,479,022,940,000,000,000,000,000,000,000 | hci_sock.c | 182,751,817,217,473,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6544 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | https://nvd.nist.gov/vuln/detail/CVE-2012-6544 |
161,465 | linux | 3f68ba07b1da811bf383b4b701b129bfcb2e4988 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3f68ba07b1da811bf383b4b701b129bfcb2e4988 | Bluetooth: HCI - Fix info leak via getsockname()
The HCI code fails to initialize the hci_channel member of struct
sockaddr_hci and that for leaks two bytes kernel stack via the
getsockname() syscall. Initialize hci_channel with 0 to avoid the
info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Marc... | 0 | static int hci_sock_getname(struct socket *sock, struct sockaddr *addr,
int *addr_len, int peer)
{
struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
struct sock *sk = sock->sk;
struct hci_dev *hdev = hci_pi(sk)->hdev;
BT_DBG("sock %p sk %p", sock, sk);
if (!hdev)
return -EBADFD;
lock_sock(sk)... | 75,641,877,797,499,630,000,000,000,000,000,000,000 | hci_sock.c | 30,229,472,495,835,100,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6544 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | https://nvd.nist.gov/vuln/detail/CVE-2012-6544 |
4,238 | linux | 883a1d49f0d77d30012f114b2e19fc141beb3e8e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e | ALSA: control: Make sure that id->index does not overflow
The ALSA control code expects that the range of assigned indices to a control is
continuous and does not overflow. Currently there are no checks to enforce this.
If a control with a overflowing index range is created that control becomes
effectively inaccessibl... | 1 | int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
{
struct snd_ctl_elem_id id;
unsigned int idx;
unsigned int count;
int err = -EINVAL;
if (! kcontrol)
return err;
if (snd_BUG_ON(!card || !kcontrol->info))
goto error;
id = kcontrol->id;
down_write(&card->controls_rwsem);
if (snd_c... | 304,470,449,259,529,630,000,000,000,000,000,000,000 | control.c | 179,532,723,377,993,540,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-4656 | Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflic... | https://nvd.nist.gov/vuln/detail/CVE-2014-4656 |
161,467 | linux | 883a1d49f0d77d30012f114b2e19fc141beb3e8e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e | ALSA: control: Make sure that id->index does not overflow
The ALSA control code expects that the range of assigned indices to a control is
continuous and does not overflow. Currently there are no checks to enforce this.
If a control with a overflowing index range is created that control becomes
effectively inaccessibl... | 0 | int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
{
struct snd_ctl_elem_id id;
unsigned int idx;
unsigned int count;
int err = -EINVAL;
if (! kcontrol)
return err;
if (snd_BUG_ON(!card || !kcontrol->info))
goto error;
id = kcontrol->id;
if (id.index > UINT_MAX - kcontrol->count)
go... | 316,970,979,251,179,580,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-4656 | Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflic... | https://nvd.nist.gov/vuln/detail/CVE-2014-4656 |
4,252 | linux | 9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 | ozwpan: unchecked signed subtraction leads to DoS
The subtraction here was using a signed integer and did not have any
bounds checking at all. This commit adds proper bounds checking, made
easy by use of an unsigned integer. This way, a single packet won't be
able to remotely trigger a massive loop, locking up the sys... | 1 | static void oz_usb_handle_ep_data(struct oz_usb_ctx *usb_ctx,
struct oz_usb_hdr *usb_hdr, int len)
{
struct oz_data *data_hdr = (struct oz_data *)usb_hdr;
switch (data_hdr->format) {
case OZ_DATA_F_MULTIPLE_FIXED: {
struct oz_multiple_fixed *body =
(struct oz_multiple_fixed *)data_hdr;
u8 *data = body... | 236,342,740,336,501,530,000,000,000,000,000,000,000 | ozusbsvc1.c | 24,203,781,560,545,576,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-4002 | drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1)... | https://nvd.nist.gov/vuln/detail/CVE-2015-4002 |
161,470 | linux | 9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 | ozwpan: unchecked signed subtraction leads to DoS
The subtraction here was using a signed integer and did not have any
bounds checking at all. This commit adds proper bounds checking, made
easy by use of an unsigned integer. This way, a single packet won't be
able to remotely trigger a massive loop, locking up the sys... | 0 | static void oz_usb_handle_ep_data(struct oz_usb_ctx *usb_ctx,
struct oz_usb_hdr *usb_hdr, int len)
{
struct oz_data *data_hdr = (struct oz_data *)usb_hdr;
switch (data_hdr->format) {
case OZ_DATA_F_MULTIPLE_FIXED: {
struct oz_multiple_fixed *body =
(struct oz_multiple_fixed *)data_hdr;
u8 *data = body... | 184,346,540,317,251,980,000,000,000,000,000,000,000 | ozusbsvc1.c | 260,597,097,415,973,820,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-4002 | drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1)... | https://nvd.nist.gov/vuln/detail/CVE-2015-4002 |
4,256 | linux | 637b58c2887e5e57850865839cc75f59184b23d1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/637b58c2887e5e57850865839cc75f59184b23d1 | switch pipe_read() to copy_page_to_iter()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | pipe_read(struct kiocb *iocb, const struct iovec *_iov,
unsigned long nr_segs, loff_t pos)
{
struct file *filp = iocb->ki_filp;
struct pipe_inode_info *pipe = filp->private_data;
int do_wakeup;
ssize_t ret;
struct iovec *iov = (struct iovec *)_iov;
size_t total_len;
total_len = iov_length(iov, nr_segs)... | 68,472,811,572,124,770,000,000,000,000,000,000,000 | pipe.c | 80,334,105,915,950,020,000,000,000,000,000,000,000 | [
"CWE-17"
] | CVE-2015-1805 | The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafte... | https://nvd.nist.gov/vuln/detail/CVE-2015-1805 |
161,473 | linux | 637b58c2887e5e57850865839cc75f59184b23d1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/637b58c2887e5e57850865839cc75f59184b23d1 | switch pipe_read() to copy_page_to_iter()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 0 | pipe_read(struct kiocb *iocb, const struct iovec *_iov,
unsigned long nr_segs, loff_t pos)
{
struct file *filp = iocb->ki_filp;
struct pipe_inode_info *pipe = filp->private_data;
int do_wakeup;
ssize_t ret;
struct iovec *iov = (struct iovec *)_iov;
size_t total_len;
struct iov_iter iter;
total_len = i... | 46,666,592,226,880,100,000,000,000,000,000,000,000 | pipe.c | 80,394,004,541,192,320,000,000,000,000,000,000,000 | [
"CWE-17"
] | CVE-2015-1805 | The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafte... | https://nvd.nist.gov/vuln/detail/CVE-2015-1805 |
4,266 | libgd | c18263e0e0769faee96a5d0ee04b750c442783c6 | https://github.com/libgd/libgd | https://github.com/php/php-src/commit/c18263e0e0769faee96a5d0ee04b750c442783c6 | None | 1 | void gdImageWebpCtx (gdImagePtr im, gdIOCtx * outfile, int quantization)
{
uint8_t *argb;
int x, y;
uint8_t *p;
uint8_t *out;
size_t out_size;
if (im == NULL) {
return;
}
if (!gdImageTrueColor(im)) {
zend_error(E_ERROR, "Paletter image not supported by webp");
return;
}
if (quantization == -1) {
q... | 260,398,564,512,501,660,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-7568 | Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. | https://nvd.nist.gov/vuln/detail/CVE-2016-7568 |
161,480 | libgd | c18263e0e0769faee96a5d0ee04b750c442783c6 | https://github.com/libgd/libgd | https://github.com/php/php-src/commit/c18263e0e0769faee96a5d0ee04b750c442783c6 | None | 0 | void gdImageWebpCtx (gdImagePtr im, gdIOCtx * outfile, int quantization)
{
uint8_t *argb;
int x, y;
uint8_t *p;
uint8_t *out;
size_t out_size;
if (im == NULL) {
return;
}
if (!gdImageTrueColor(im)) {
zend_error(E_ERROR, "Paletter image not supported by webp");
return;
}
if (quantization == -1) {
q... | 210,913,798,693,502,300,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-7568 | Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. | https://nvd.nist.gov/vuln/detail/CVE-2016-7568 |
4,267 | openjpeg | ef01f18dfc6780b776d0674ed3e7415c6ef54d24 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24 | Cast to size_t before multiplication
Need to cast to size_t before multiplication otherwise overflow check is useless. | 1 | opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,
opj_cp_t *p_cp,
OPJ_UINT32 p_tile_no)
{
/* loop */
OPJ_UINT32 pino;
OPJ_UINT32 compno, resno;
/* to store w, h, dx and dy fro all components and resolutions */
OPJ_UINT32 * l_tmp_data;
OPJ_UINT32 ** l_tmp_ptr;
/* encoding pramete... | 214,675,431,033,653,840,000,000,000,000,000,000,000 | pi.c | 155,797,594,499,992,280,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7163 | Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write. | https://nvd.nist.gov/vuln/detail/CVE-2016-7163 |
161,481 | openjpeg | ef01f18dfc6780b776d0674ed3e7415c6ef54d24 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24 | Cast to size_t before multiplication
Need to cast to size_t before multiplication otherwise overflow check is useless. | 0 | opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,
opj_cp_t *p_cp,
OPJ_UINT32 p_tile_no)
{
/* loop */
OPJ_UINT32 pino;
OPJ_UINT32 compno, resno;
/* to store w, h, dx and dy fro all components and resolutions */
OPJ_UINT32 * l_tmp_data;
OPJ_UINT32 ** l_tmp_ptr;
/* encoding pramete... | 332,180,353,794,727,360,000,000,000,000,000,000,000 | pi.c | 315,094,855,754,080,930,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7163 | Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write. | https://nvd.nist.gov/vuln/detail/CVE-2016-7163 |
4,269 | linux | 54d5ca871e72f2bb172ec9323497f01cd5091ec7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/54d5ca871e72f2bb172ec9323497f01cd5091ec7 | vfs: add vfs_select_inode() helper
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Cc: <stable@vger.kernel.org> # v4.2+ | 1 | int vfs_open(const struct path *path, struct file *file,
const struct cred *cred)
{
struct dentry *dentry = path->dentry;
struct inode *inode = dentry->d_inode;
file->f_path = *path;
if (dentry->d_flags & DCACHE_OP_SELECT_INODE) {
inode = dentry->d_op->d_select_inode(dentry, file->f_flags);
if (IS_ER... | 81,047,983,480,425,140,000,000,000,000,000,000,000 | open.c | 329,475,889,001,649,380,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-6198 | The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-6198 |
161,482 | linux | 54d5ca871e72f2bb172ec9323497f01cd5091ec7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/54d5ca871e72f2bb172ec9323497f01cd5091ec7 | vfs: add vfs_select_inode() helper
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Cc: <stable@vger.kernel.org> # v4.2+ | 0 | int vfs_open(const struct path *path, struct file *file,
const struct cred *cred)
{
struct inode *inode = vfs_select_inode(path->dentry, file->f_flags);
if (IS_ERR(inode))
return PTR_ERR(inode);
file->f_path = *path;
return do_dentry_open(file, inode, NULL, cred);
}
| 7,196,853,628,832,164,000,000,000,000,000,000,000 | open.c | 199,980,928,471,130,880,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-6198 | The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-6198 |
4,281 | ImageMagick | fc43974d34318c834fbf78570ca1a3764ed8c7d7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fc43974d34318c834fbf78570ca1a3764ed8c7d7 | Ensure image extent does not exceed maximum | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 180,171,464,052,447,030,000,000,000,000,000,000,000 | wpg.c | 99,965,343,271,644,740,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-5688 | The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5688 |
161,487 | ImageMagick | fc43974d34318c834fbf78570ca1a3764ed8c7d7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fc43974d34318c834fbf78570ca1a3764ed8c7d7 | Ensure image extent does not exceed maximum | 0 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 17,794,074,542,834,030,000,000,000,000,000,000,000 | wpg.c | 242,497,662,142,169,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-5688 | The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5688 |
4,288 | libimobiledevice | 4397b3376dc4e4cb1c991d0aed61ce6482614196 | https://github.com/libimobiledevice/libimobiledevice | https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196 | None | 1 | int socket_create(uint16_t port)
{
int sfd = -1;
int yes = 1;
#ifdef WIN32
WSADATA wsa_data;
if (!wsa_init) {
if (WSAStartup(MAKEWORD(2,2), &wsa_data) != ERROR_SUCCESS) {
fprintf(stderr, "WSAStartup failed!\n");
ExitProcess(-1);
}
wsa_init = 1;
}
#endif
struct sockaddr_in saddr;
if (0 > (sfd = socke... | 294,733,776,418,858,640,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-5104 | The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket. | https://nvd.nist.gov/vuln/detail/CVE-2016-5104 |
161,491 | libimobiledevice | 4397b3376dc4e4cb1c991d0aed61ce6482614196 | https://github.com/libimobiledevice/libimobiledevice | https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196 | None | 0 | int socket_create(uint16_t port)
{
int sfd = -1;
int yes = 1;
#ifdef WIN32
WSADATA wsa_data;
if (!wsa_init) {
if (WSAStartup(MAKEWORD(2,2), &wsa_data) != ERROR_SUCCESS) {
fprintf(stderr, "WSAStartup failed!\n");
ExitProcess(-1);
}
wsa_init = 1;
}
#endif
struct sockaddr_in saddr;
if (0 > (sfd = socke... | 317,403,681,550,217,450,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-5104 | The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket. | https://nvd.nist.gov/vuln/detail/CVE-2016-5104 |
4,290 | linux | 1666984c8625b3db19a9abc298931d35ab7bc64b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b | usbnet: cleanup after bind() in probe()
In case bind() works, but a later error forces bailing
in probe() in error cases work and a timer may be scheduled.
They must be killed. This fixes an error case related to
the double free reported in
http://www.spinics.net/lists/netdev/msg367669.html
and needs to go on top of L... | 1 | usbnet_probe (struct usb_interface *udev, const struct usb_device_id *prod)
{
struct usbnet *dev;
struct net_device *net;
struct usb_host_interface *interface;
struct driver_info *info;
struct usb_device *xdev;
int status;
const char *name;
struct usb_driver *driver = to_usb_driver(udev->dev.driver);... | 17,911,033,984,720,165,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2016-3951 | Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor. | https://nvd.nist.gov/vuln/detail/CVE-2016-3951 |
161,492 | linux | 1666984c8625b3db19a9abc298931d35ab7bc64b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b | usbnet: cleanup after bind() in probe()
In case bind() works, but a later error forces bailing
in probe() in error cases work and a timer may be scheduled.
They must be killed. This fixes an error case related to
the double free reported in
http://www.spinics.net/lists/netdev/msg367669.html
and needs to go on top of L... | 0 | usbnet_probe (struct usb_interface *udev, const struct usb_device_id *prod)
{
struct usbnet *dev;
struct net_device *net;
struct usb_host_interface *interface;
struct driver_info *info;
struct usb_device *xdev;
int status;
const char *name;
struct usb_driver *driver = to_usb_driver(udev->dev.driver);... | 172,502,720,494,469,000,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2016-3951 | Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor. | https://nvd.nist.gov/vuln/detail/CVE-2016-3951 |
4,291 | libndp | 2af9a55b38b55abbf05fd116ec097d4029115839 | https://github.com/jpirko/libndp | https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839 | libndb: reject redirect and router advertisements from non-link-local
RFC4861 suggests that these messages should only originate from
link-local addresses in 6.1.2 (RA) and 8.1. (redirect):
Mitigates CVE-2016-3698.
Signed-off-by: Lubomir Rintel <lkundrak@v3.sk>
Signed-off-by: Jiri Pirko <jiri@mellanox.com> | 1 | static bool ndp_msg_check_valid(struct ndp_msg *msg)
{
size_t len = ndp_msg_payload_len(msg);
enum ndp_msg_type msg_type = ndp_msg_type(msg);
if (len < ndp_msg_type_info(msg_type)->raw_struct_size)
return false;
return true;
}
| 263,634,785,860,008,600,000,000,000,000,000,000,000 | libndp.c | 106,315,038,392,236,970,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-3698 | libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network. | https://nvd.nist.gov/vuln/detail/CVE-2016-3698 |
161,493 | libndp | 2af9a55b38b55abbf05fd116ec097d4029115839 | https://github.com/jpirko/libndp | https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839 | libndb: reject redirect and router advertisements from non-link-local
RFC4861 suggests that these messages should only originate from
link-local addresses in 6.1.2 (RA) and 8.1. (redirect):
Mitigates CVE-2016-3698.
Signed-off-by: Lubomir Rintel <lkundrak@v3.sk>
Signed-off-by: Jiri Pirko <jiri@mellanox.com> | 0 | static bool ndp_msg_check_valid(struct ndp_msg *msg)
{
size_t len = ndp_msg_payload_len(msg);
enum ndp_msg_type msg_type = ndp_msg_type(msg);
if (len < ndp_msg_type_info(msg_type)->raw_struct_size)
return false;
if (ndp_msg_type_info(msg_type)->addrto_validate)
return ndp_msg_type_info(msg_type)->addrto_va... | 266,563,217,351,674,050,000,000,000,000,000,000,000 | libndp.c | 238,681,317,642,508,630,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-3698 | libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network. | https://nvd.nist.gov/vuln/detail/CVE-2016-3698 |
4,322 | linux | 3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb | KVM: VMX: Do not BUG() on out-of-bounds guest IRQ
The value of the guest_irq argument to vmx_update_pi_irte() is
ultimately coming from a KVM_IRQFD API call. Do not BUG() in
vmx_update_pi_irte() if the value is out-of bounds. (Especially,
since KVM as a whole seems to hang after that.)
Instead, print a message only o... | 1 | static int vmx_update_pi_irte(struct kvm *kvm, unsigned int host_irq,
uint32_t guest_irq, bool set)
{
struct kvm_kernel_irq_routing_entry *e;
struct kvm_irq_routing_table *irq_rt;
struct kvm_lapic_irq irq;
struct kvm_vcpu *vcpu;
struct vcpu_data vcpu_info;
int idx, ret = -EINVAL;
if (!kvm_arch_has... | 231,515,050,173,833,580,000,000,000,000,000,000,000 | vmx.c | 59,498,124,009,138,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-1000252 | The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000252 |
161,521 | linux | 3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb | KVM: VMX: Do not BUG() on out-of-bounds guest IRQ
The value of the guest_irq argument to vmx_update_pi_irte() is
ultimately coming from a KVM_IRQFD API call. Do not BUG() in
vmx_update_pi_irte() if the value is out-of bounds. (Especially,
since KVM as a whole seems to hang after that.)
Instead, print a message only o... | 0 | static int vmx_update_pi_irte(struct kvm *kvm, unsigned int host_irq,
uint32_t guest_irq, bool set)
{
struct kvm_kernel_irq_routing_entry *e;
struct kvm_irq_routing_table *irq_rt;
struct kvm_lapic_irq irq;
struct kvm_vcpu *vcpu;
struct vcpu_data vcpu_info;
int idx, ret = 0;
if (!kvm_arch_has_assig... | 119,237,130,558,296,380,000,000,000,000,000,000,000 | vmx.c | 283,125,050,654,094,230,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-1000252 | The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000252 |
4,324 | ImageMagick | e04cf3e9524f50ca336253513d977224e083b816 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e04cf3e9524f50ca336253513d977224e083b816 | None | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 93,853,924,778,718,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-16546 | The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2017-16546 |
161,522 | ImageMagick | e04cf3e9524f50ca336253513d977224e083b816 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e04cf3e9524f50ca336253513d977224e083b816 | None | 0 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 184,420,110,088,571,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-16546 | The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2017-16546 |
4,325 | linux | bd998c2e0df0469707503023d50d46cf0b10c787 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787 | USB: serial: console: fix use-after-free on disconnect
A clean-up patch removing two redundant NULL-checks from the console
disconnect handler inadvertently also removed a third check. This could
lead to the struct usb_serial being prematurely freed by the console
code when a driver accepts but does not register any p... | 1 | void usb_serial_console_disconnect(struct usb_serial *serial)
{
if (serial->port[0] == usbcons_info.port) {
usb_serial_console_exit();
usb_serial_put(serial);
}
}
| 5,359,239,449,223,849,000,000,000,000,000,000,000 | console.c | 156,313,628,004,751,300,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16525 | The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup. | https://nvd.nist.gov/vuln/detail/CVE-2017-16525 |
161,523 | linux | bd998c2e0df0469707503023d50d46cf0b10c787 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787 | USB: serial: console: fix use-after-free on disconnect
A clean-up patch removing two redundant NULL-checks from the console
disconnect handler inadvertently also removed a third check. This could
lead to the struct usb_serial being prematurely freed by the console
code when a driver accepts but does not register any p... | 0 | void usb_serial_console_disconnect(struct usb_serial *serial)
{
if (serial->port[0] && serial->port[0] == usbcons_info.port) {
usb_serial_console_exit();
usb_serial_put(serial);
}
}
| 107,203,638,280,928,400,000,000,000,000,000,000,000 | console.c | 11,202,367,889,646,958,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16525 | The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup. | https://nvd.nist.gov/vuln/detail/CVE-2017-16525 |
4,326 | radare2 | d21e91f075a7a7a8ed23baa5c1bb1fac48313882 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d21e91f075a7a7a8ed23baa5c1bb1fac48313882 | Fix #8764 differently since ptr diff might not fit in ptrdiff_t | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 177,654,284,276,873,100,000,000,000,000,000,000,000 | elf.c | 150,931,977,046,631,910,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.