idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
16,237
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_sample_mask(struct vrend_decode_ctx *ctx, int length) { unsigned mask; if (length != VIRGL_SET_SAMPLE_MASK_SIZE) return EINVAL; mask = get_buf_entry(ctx, VIRGL_SET_SAMPLE_MASK_MASK); vrend_set_sample_mask(ctx->grctx, mask); return 0; }
228,160,038,241,499,800,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,238
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_sampler_views(struct vrend_decode_ctx *ctx, uint16_t length) { int num_samps; int i; uint32_t shader_type, start_slot; if (length < 2) return EINVAL; num_samps = length - 2; shader_type = get_buf_entry(ctx, VIRGL_SET_SAMPLER_VIEWS_SHADER_TYPE); start_slot = get_bu...
222,162,027,872,923,600,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,239
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_scissor_state(struct vrend_decode_ctx *ctx, int length) { struct pipe_scissor_state ss[PIPE_MAX_VIEWPORTS]; uint32_t temp; uint32_t num_scissor, start_slot; int s; if (length < 1) return EINVAL; if ((length - 1) % 2) return EINVAL; num_scissor = (length - 1...
304,203,084,802,824,130,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,240
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_stencil_ref(struct vrend_decode_ctx *ctx, int length) { if (length != VIRGL_SET_STENCIL_REF_SIZE) return EINVAL; struct pipe_stencil_ref ref; uint32_t val = get_buf_entry(ctx, VIRGL_SET_STENCIL_REF); ref.ref_value[0] = val & 0xff; ref.ref_value[1] = (val >> 8) & 0xff; ...
33,471,486,470,249,240,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,241
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_streamout_targets(struct vrend_decode_ctx *ctx, uint16_t length) { uint32_t handles[16]; uint32_t num_handles = length - 1; uint32_t append_bitmask; int i; if (length < 1) return EINVAL; if (num_handles > ARRAY_SIZE(handl...
117,587,104,473,418,850,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,242
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_sub_ctx(struct vrend_decode_ctx *ctx, int length) { if (length != 1) return EINVAL; uint32_t ctx_sub_id = get_buf_entry(ctx, 1); vrend_renderer_set_sub_ctx(ctx->grctx, ctx_sub_id); return 0; }
62,870,414,490,944,065,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,243
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_uniform_buffer(struct vrend_decode_ctx *ctx, int length) { if (length != VIRGL_SET_UNIFORM_BUFFER_SIZE) return EINVAL; uint32_t shader = get_buf_entry(ctx, VIRGL_SET_UNIFORM_BUFFER_SHADER_TYPE); uint32_t index = get_buf_entry(ctx, VIRGL_SET_UNIFORM_BUFFER_INDEX); uint32_t ...
196,485,960,482,577,000,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,244
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
static int vrend_decode_set_vertex_buffers(struct vrend_decode_ctx *ctx, uint16_t length) { int num_vbo; int i; /* must be a multiple of 3 */ if (length && (length % 3)) return EINVAL; num_vbo = (length / 3); if (num_vbo > PIPE_MAX_ATTRIBS) return EINVAL; for (i = 0; i < num_vbo; i++...
143,740,420,111,094,100,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,245
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
struct vrend_context *vrend_lookup_renderer_ctx(uint32_t ctx_id) { if (ctx_id >= VREND_MAX_CTX) return NULL; if (dec_ctx[ctx_id] == NULL) return NULL; return dec_ctx[ctx_id]->grctx; }
181,654,337,417,707,150,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,246
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
int vrend_renderer_context_create(uint32_t handle, uint32_t nlen, const char *debug_name) { if (handle >= VREND_MAX_CTX) return EINVAL; /* context 0 is always available with no guarantees */ if (handle == 0) return EINVAL; vrend_renderer_context_create_internal(handle, nlen, debug_name); re...
122,900,034,354,789,300,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,247
virglrenderer
0a5dff15912207b83018485f83e067474e818bab
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
vrend: never destroy context 0 in vrend_renderer_context_destroy There will be a crash if the guest destroy context 0. As the context 0 is allocate in renderer init, not destroy in vrend_renderer_context_destroy. The context will be freed in renderer fini by calling vrend_decode_reset. Signed-off-by: Li Qiang <liq3ea...
0
void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen, const char *debug_name) { struct vrend_decode_ctx *dctx; if (handle >= VREND_MAX_CTX) return; dctx = dec_ctx[handle]; if (dctx) return; dctx = malloc(sizeof(struct vrend_...
281,467,029,163,563,000,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
https://nvd.nist.gov/vuln/detail/CVE-2017-6210
16,248
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static void eat_opt_white( const char **pcur ) { while (**pcur == ' ' || **pcur == '\t' || **pcur == '\n') (*pcur)++; }
243,348,369,308,448,670,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,249
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static void eat_until_eol( const char **pcur ) { while (**pcur != '\0' && **pcur != '\n') (*pcur)++; }
312,626,506,492,585,700,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,250
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean eat_white( const char **pcur ) { const char *cur = *pcur; eat_opt_white( pcur ); return *pcur > cur; }
36,790,406,525,666,810,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,251
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean is_alpha_underscore( const char *cur ) { return (*cur >= 'a' && *cur <= 'z') || (*cur >= 'A' && *cur <= 'Z') || *cur == '_'; }
230,596,309,245,383,340,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,252
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean is_digit_alpha_underscore( const char *cur ) { return is_digit( cur ) || is_alpha_underscore( cur ); }
289,429,820,911,624,160,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,253
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean parse_int( const char **pcur, int *val ) { const char *cur = *pcur; int sign = (*cur == '-' ? -1 : 1); if (*cur == '+' || *cur == '-') cur++; if (parse_uint(&cur, (uint *)val)) { *val *= sign; *pcur = cur; return TRUE; } return FALSE; }
101,903,318,672,433,500,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,254
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean parse_uint( const char **pcur, uint *val ) { const char *cur = *pcur; if (is_digit( cur )) { *val = *cur++ - '0'; while (is_digit( cur )) *val = *val * 10 + *cur++ - '0'; *pcur = cur; return TRUE; } return FALSE; }
336,089,917,454,117,970,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,255
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean str_match_no_case( const char **pcur, const char *str ) { const char *cur = *pcur; while (*str != '\0' && *str == uprcase( *cur )) { str++; cur++; } if (*str == '\0') { *pcur = cur; return TRUE; } return FALSE; }
164,125,245,120,560,550,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,256
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static boolean str_match_nocase_whole( const char **pcur, const char *str ) { const char *cur = *pcur; if (str_match_no_case(&cur, str) && !is_digit_alpha_underscore(cur)) { *pcur = cur; return TRUE; } return FALSE; }
1,750,938,175,002,070,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,257
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
streq_nocase_uprcase(const char *str1, const char *str2) { while (*str1 && *str2) { if (*str1 != uprcase(*str2)) return FALSE; str1++; str2++; } return *str1 == 0 && *str2 == 0; }
188,088,820,665,698,360,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,258
virglrenderer
e534b51ca3c3cd25f3990589932a9ed711c59b27
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
gallium/tgsi: fix overflow in parse property In parse_identifier, it doesn't stop copying '*pcur' untill encounter the NULL. As the 'ret' has a fixed-size buffer, if the '*pcur' has a long string, there will be a buffer overflow. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-Andr...
0
static char uprcase( char c ) { if (c >= 'a' && c <= 'z') return c + 'A' - 'a'; return c; }
2,681,672,226,215,470,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
https://nvd.nist.gov/vuln/detail/CVE-2017-6209
16,259
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
renderer: fix heap overflow in vertex elements state create The 'num_elements' can be controlled by the guest but the 'vrend_vertex_element_array' has a fixed 'elements' field. This can cause a heap overflow. Add sanity check of 'num_elements'. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-André Lureau...
0
static struct vrend_linked_shader_program *add_shader_program(struct vrend_context *ctx, struct vrend_shader *vs, struct vrend_shader *fs, ...
56,436,090,781,883,260,000,000,000,000,000,000,000
vrend_renderer.c
180,605,988,008,894,840,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5994
Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
https://nvd.nist.gov/vuln/detail/CVE-2017-5994
16,260
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
renderer: fix heap overflow in vertex elements state create The 'num_elements' can be controlled by the guest but the 'vrend_vertex_element_array' has a fixed 'elements' field. This can cause a heap overflow. Add sanity check of 'num_elements'. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-André Lureau...
0
vrend_shader_state_reference(struct vrend_shader_selector **ptr, struct vrend_shader_selector *shader) { struct vrend_shader_selector *old_shader = *ptr; if (pipe_reference(&(*ptr)->reference, &shader->reference)) vrend_destroy_shader_selector(old_shader); *ptr = shader; }
155,035,002,412,305,570,000,000,000,000,000,000,000
vrend_renderer.c
16,381,365,421,525,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5994
Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
https://nvd.nist.gov/vuln/detail/CVE-2017-5994
16,261
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
renderer: fix heap overflow in vertex elements state create The 'num_elements' can be controlled by the guest but the 'vrend_vertex_element_array' has a fixed 'elements' field. This can cause a heap overflow. Add sanity check of 'num_elements'. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-André Lureau...
0
static void vrend_stencil_test_enable(struct vrend_context *ctx, bool stencil_test_enable) { if (ctx->sub->stencil_test_enabled != stencil_test_enable) { ctx->sub->stencil_test_enabled = stencil_test_enable; if (stencil_test_enable) glEnable(GL_STENCIL_TEST); else glDisable(GL_STE...
112,514,596,908,188,860,000,000,000,000,000,000,000
vrend_renderer.c
16,381,365,421,525,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5994
Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
https://nvd.nist.gov/vuln/detail/CVE-2017-5994
16,262
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
renderer: fix heap overflow in vertex elements state create The 'num_elements' can be controlled by the guest but the 'vrend_vertex_element_array' has a fixed 'elements' field. This can cause a heap overflow. Add sanity check of 'num_elements'. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-André Lureau...
0
vrend_surface_reference(struct vrend_surface **ptr, struct vrend_surface *surf) { struct vrend_surface *old_surf = *ptr; if (pipe_reference(&(*ptr)->reference, &surf->reference)) vrend_destroy_surface(old_surf); *ptr = surf; }
52,923,313,350,727,950,000,000,000,000,000,000,000
vrend_renderer.c
16,381,365,421,525,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5994
Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
https://nvd.nist.gov/vuln/detail/CVE-2017-5994
16,263
virglrenderer
114688c526fe45f341d75ccd1d85473c3b08f7a7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
renderer: fix heap overflow in vertex elements state create The 'num_elements' can be controlled by the guest but the 'vrend_vertex_element_array' has a fixed 'elements' field. This can cause a heap overflow. Add sanity check of 'num_elements'. Signed-off-by: Li Qiang <liq3ea@gmail.com> Reviewed-by: Marc-André Lureau...
0
static void vrend_use_program(struct vrend_context *ctx, GLuint program_id) { if (ctx->sub->program_id != program_id) { glUseProgram(program_id); ctx->sub->program_id = program_id; } }
336,854,190,525,253,700,000,000,000,000,000,000,000
vrend_renderer.c
16,381,365,421,525,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5994
Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
https://nvd.nist.gov/vuln/detail/CVE-2017-5994
16,264
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static GLuint blit_build_frag_blit_msaa_depth(struct vrend_blitter_ctx *blit_ctx, int tgsi_tex_target) { GLuint fs_id; char shader_buf[4096]; int is_shad; const char *twm; const char *ivec; switch (tgsi_tex_target) { case TGSI_TEXTURE_2D_MSAA: twm = ".xy"; ivec = "ivec2"; break; ...
317,228,931,504,243,000,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,265
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static GLuint blit_build_frag_tex_col_emu_alpha(struct vrend_blitter_ctx *blit_ctx, int tgsi_tex_target) { GLuint fs_id; char shader_buf[4096]; int is_shad; const char *twm; const char *ext_str = ""; switch (tgsi_tex_target) { case TGSI_TEXTURE_1D: case TGSI_TEXTURE_BUFFER: twm = ".x"; ...
56,438,019,067,141,605,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,266
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static GLuint blit_build_frag_tex_writedepth(struct vrend_blitter_ctx *blit_ctx, int tgsi_tex_target) { GLuint fs_id; char shader_buf[4096]; int is_shad; const char *twm; switch (tgsi_tex_target) { case TGSI_TEXTURE_1D: case TGSI_TEXTURE_BUFFER: twm = ".x"; break; case TGSI_TEXTURE_...
209,444,893,466,953,040,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,267
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static bool blit_build_vs_passthrough(struct vrend_blitter_ctx *blit_ctx) { blit_ctx->vs = glCreateShader(GL_VERTEX_SHADER); if (!build_and_check(blit_ctx->vs, VS_PASSTHROUGH)) { glDeleteShader(blit_ctx->vs); blit_ctx->vs = 0; return false; } return true; }
37,171,782,638,109,720,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,268
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static GLuint blit_get_frag_tex_col_emu_alpha(struct vrend_blitter_ctx *blit_ctx, int pipe_tex_target, unsigned nr_samples) { assert(pipe_tex_target < PIPE_MAX_TEXTURE_TYPES); if (nr_samples > 1) { return 0; } else { GLuint *shader = &blit_ctx->fs_texfetch_col_emu_alpha[pipe_tex_target]; if...
304,678,345,197,617,880,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,269
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static GLuint blit_get_frag_tex_writedepth(struct vrend_blitter_ctx *blit_ctx, int pipe_tex_target, unsigned nr_samples) { assert(pipe_tex_target < PIPE_MAX_TEXTURE_TYPES); if (nr_samples > 1) { GLuint *shader = &blit_ctx->fs_texfetch_depth_msaa[pipe_tex_target]; if (!*shader) { unsigned tg...
239,900,786,116,426,440,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,270
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static void blitter_set_dst_dim(struct vrend_blitter_ctx *blit_ctx, unsigned width, unsigned height) { blit_ctx->dst_width = width; blit_ctx->dst_height = height; }
192,962,369,514,130,970,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,271
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static void blitter_set_rectangle(struct vrend_blitter_ctx *blit_ctx, int x1, int y1, int x2, int y2, float depth) { int i; /* set vertex positions */ blit_ctx->vertices[0][0][0] = (float)x1 / blit_ctx->dst_width * 2.0f - 1.0f; /*v0.x*/ bl...
44,591,623,748,959,600,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,272
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static void blitter_set_texcoords(struct vrend_blitter_ctx *blit_ctx, struct vrend_resource *src_res, int level, float layer, unsigned sample, int x1, int y1, int x2, int y2) { floa...
325,884,528,606,767,370,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,273
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static bool build_and_check(GLuint id, const char *buf) { GLint param; glShaderSource(id, 1, (const char **)&buf, NULL); glCompileShader(id); glGetShaderiv(id, GL_COMPILE_STATUS, &param); if (param == GL_FALSE) { char infolog[65536]; int len; glGetShaderInfoLog(id, 65536, &len, infolog...
94,675,784,005,109,890,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,274
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static void get_texcoords(struct vrend_resource *src_res, int src_level, int x1, int y1, int x2, int y2, float out[4]) { bool normalized = src_res->base.target != PIPE_TEXTURE_RECT && src_res->base.nr_samples <= 1; if (normalized...
137,913,459,201,680,650,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,275
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static void set_dsa_write_depth_keep_stencil(void) { glDisable(GL_STENCIL_TEST); glEnable(GL_DEPTH_TEST); glDepthFunc(GL_ALWAYS); glDepthMask(GL_TRUE); }
37,916,605,097,032,825,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,276
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static void set_texcoords_in_vertices(const float coord[4], float *out, unsigned stride) { out[0] = coord[0]; /*t0.s*/ out[1] = coord[1]; /*t0.t*/ out += stride; out[0] = coord[2]; /*t1.s*/ out[1] = coord[1]; /*t1.t*/ out += stride; out[0] = coord[2]; /*t2.s*/ ...
117,373,714,956,023,750,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,277
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
void vrend_renderer_blit_gl(struct vrend_context *ctx, struct vrend_resource *src_res, struct vrend_resource *dst_res, const struct pipe_blit_info *info) { struct vrend_blitter_ctx *blit_ctx = &vrend_blit_ctx; GLuint prog_id; G...
296,085,075,758,333,040,000,000,000,000,000,000,000
vrend_blitter.c
200,365,286,071,854,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
16,278
virglrenderer
a5ac49940c40ae415eac0cf912eac7070b4ba95d
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=a5ac49940c40ae415eac0cf912eac7070b4ba95d
vrend: add sanity check for vertext buffer index The vertext_buffer_index is read from guest and then used to index the 'vbo' array in struct 'vrend_sub_context'. Add sanity check for this to avoid oob issue. Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com> Signed-off-by: Li Qiang <liq3ea@gmail.com> Signe...
0
void vrend_renderer_context_destroy(uint32_t handle) { struct vrend_decode_ctx *ctx; bool ret; if (handle >= VREND_MAX_CTX) return; ctx = dec_ctx[handle]; if (!ctx) return; dec_ctx[handle] = NULL; ret = vrend_destroy_context(ctx->grctx); free(ctx); /* switch to ctx 0 */ if (r...
2,374,651,562,394,890,300,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-5956
The vrend_draw_vbo function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors involving vertext_buffer_index.
https://nvd.nist.gov/vuln/detail/CVE-2017-5956
16,302
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static int link_proto(int unit_nr, const char *devname, uint64_t flags) { int ip_fd, mux_id, tun2_fd; struct lifreq ifr; tun2_fd = open("/dev/tun", O_RDWR); if (tun2_fd < 0) { perror(_("Could not /dev/tun for plumbing")); return -EIO; } if (ioctl(tun2_fd, I_PUSH, "ip") < 0) { perror(_("Can't push IP")); ...
266,649,861,417,152,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,303
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static int netmasklen(struct in_addr addr) { int masklen; for (masklen = 0; masklen < 32; masklen++) { if (ntohl(addr.s_addr) >= (0xffffffff << masklen)) break; } return 32 - masklen; }
288,211,670,073,702,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,304
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static int os_setup_tun(struct openconnect_info *vpninfo) { int tun_fd; #ifdef IFF_TUN /* Linux */ struct ifreq ifr; int tunerr; tun_fd = open("/dev/net/tun", O_RDWR); if (tun_fd < 0) { /* Android has /dev/tun instead of /dev/net/tun Since other systems might have too, just try it as a fallback inste...
67,744,143,599,453,610,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,305
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static int process_split_xxclude(struct openconnect_info *vpninfo, int include, const char *route, int *v4_incs, int *v6_incs) { struct in_addr addr; const char *in_ex = include?"IN":"EX"; char envname[80]; char *slash; slash = strchr(route, '/'); if (!slash) { badinc: if (include) vpn_progress(v...
289,749,107,440,734,640,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,306
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
int script_config_tun(struct openconnect_info *vpninfo, const char *reason) { if (!vpninfo->vpnc_script) return 0; setenv("reason", reason, 1); if (system(vpninfo->vpnc_script)) { int e = errno; vpn_progress(vpninfo, PRG_ERR, _("Failed to spawn script '%s' for %s: %s\n"), vpninfo->vpnc_script,...
142,403,838,390,108,580,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,307
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static int set_tun_mtu(struct openconnect_info *vpninfo) { #ifndef __sun__ /* We don't know how to do this on Solaris */ struct ifreq ifr; int net_fd; net_fd = socket(PF_INET, SOCK_DGRAM, 0); if (net_fd < 0) { perror(_("open net")); return -EINVAL; } memset(&ifr, 0, sizeof(ifr)); strncpy(ifr.ifr_name, vpni...
240,752,844,978,670,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,308
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static void setenv_cstp_opts(struct openconnect_info *vpninfo) { char *env_buf; int buflen = 0; int bufofs = 0; struct vpn_option *opt; for (opt = vpninfo->cstp_options; opt; opt = opt->next) buflen += 2 + strlen(opt->option) + strlen(opt->value); env_buf = malloc(buflen + 1); if (!env_buf) return; env_b...
148,776,727,535,281,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,309
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
static int setenv_int(const char *opt, int value) { char buf[16]; sprintf(buf, "%d", value); return setenv(opt, buf, 1); }
32,903,752,538,523,850,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,310
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
int setup_tun(struct openconnect_info *vpninfo) { int tun_fd; set_script_env(vpninfo); if (vpninfo->script_tun) { pid_t child; int fds[2]; if (socketpair(AF_UNIX, SOCK_DGRAM, 0, fds)) { perror(_("socketpair")); exit(1); } tun_fd = fds[0]; child = fork(); if (child < 0) { perror(_("fork")); ...
73,279,837,977,108,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,311
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
void shutdown_tun(struct openconnect_info *vpninfo) { if (vpninfo->script_tun) { kill(vpninfo->script_tun, SIGHUP); } else { script_config_tun(vpninfo, "disconnect"); #ifdef __sun__ close(vpninfo->ip_fd); vpninfo->ip_fd = -1; if (vpninfo->ip6_fd != -1) { close(vpninfo->ip6_fd); vpninfo->ip6_fd = -1; ...
36,549,913,052,764,547,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,312
infradead
14cae65318d3ef1f7d449e463b72b6934e82f1c2
http://git.infradead.org/?p=mtd-2.6
http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
None
0
int tun_mainloop(struct openconnect_info *vpninfo, int *timeout) { int work_done = 0; int prefix_size = 0; #ifdef TUN_HAS_AF_PREFIX if (!vpninfo->script_tun) prefix_size = sizeof(int); #endif if (FD_ISSET(vpninfo->tun_fd, &vpninfo->select_rfds)) { while (1) { int len = vpninfo->mtu; if (!out_pkt) { ...
328,773,527,450,457,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2012-3291
Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
https://nvd.nist.gov/vuln/detail/CVE-2012-3291
16,356
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit) { int extdatalen = 0; unsigned char *orig = buf; unsigned char *ret = buf; /* don't add extensions for SSLv3 unless doing secure renegotiation */ if (s->client_versi...
265,156,541,683,119,670,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,357
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
unsigned char *ssl_add_serverhello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit) { int extdatalen = 0; unsigned char *orig = buf; unsigned char *ret = buf; # ifndef OPENSSL_NO_NEXTPROTONEG int next_proto_neg_seen; # endif /* * don't add exte...
141,748,100,890,163,090,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,358
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int ssl_check_clienthello_tlsext_early(SSL *s) { int ret = SSL_TLSEXT_ERR_NOACK; int al = SSL_AD_UNRECOGNIZED_NAME; # ifndef OPENSSL_NO_EC /* * The handling of the ECPointFormats extension is done elsewhere, namely * in ssl3_choose_cipher in s3_lib.c. */ /* * The handling of the Ell...
115,917,008,654,524,030,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,359
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int ssl_check_clienthello_tlsext_late(SSL *s) { int ret = SSL_TLSEXT_ERR_OK; int al; /* * If status request then ask callback what to do. Note: this must be * called after servername callbacks in case the certificate has * changed, and must be called after the cipher has been chosen because ...
283,894,878,608,128,400,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,360
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsigned char *limit) { unsigned short type, size; static const unsigned char kSafariExtensionsBlock[] = { 0x00, 0x0a, /* elliptic_curves extension */ 0x00, 0x08, /*...
308,756,757,660,561,640,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,361
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int ssl_check_serverhello_tlsext(SSL *s) { int ret = SSL_TLSEXT_ERR_NOACK; int al = SSL_AD_UNRECOGNIZED_NAME; # ifndef OPENSSL_NO_EC /* * If we are client and using an elliptic curve cryptography cipher * suite, then if server returns an EC point formats lists extension it * must contain unc...
223,565,521,743,445,260,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,362
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int ssl_parse_serverhello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { unsigned short length; unsigned short type; unsigned short size; unsigned char *data = *p; int tlsext_servername = 0; int renegotiate_seen = 0; # ifndef OPENSSL_NO_NE...
203,195,469,458,297,470,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,363
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int ssl_prepare_clienthello_tlsext(SSL *s) { # ifndef OPENSSL_NO_EC /* * If we are client and using an elliptic curve cryptography cipher * suite, send the point formats and elliptic curves we support. */ int using_ecc = 0; int i; unsigned char *j; unsigned long alg_k, alg_a; STAC...
26,038,924,743,070,747,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,364
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int ssl_prepare_serverhello_tlsext(SSL *s) { # ifndef OPENSSL_NO_EC /* * If we are server and using an ECC cipher suite, send the point formats * we support if the client sent us an ECPointsFormat extension. Note * that the server is not supposed to send an EllipticCurves extension. */ uns...
189,879,422,232,650,200,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,365
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
const EVP_MD *tls12_get_hash(unsigned char hash_alg) { switch (hash_alg) { # ifndef OPENSSL_NO_SHA case TLSEXT_hash_sha1: return EVP_sha1(); # endif # ifndef OPENSSL_NO_SHA256 case TLSEXT_hash_sha224: return EVP_sha224(); case TLSEXT_hash_sha256: return EVP_sha256(); # endif # i...
104,261,691,433,341,360,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,366
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls12_get_req_sig_algs(SSL *s, unsigned char *p) { size_t slen = sizeof(tls12_sigalgs); if (p) memcpy(p, tls12_sigalgs, slen); return (int)slen; }
65,824,713,383,170,120,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,367
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls1_ec_curve_id2nid(int curve_id) { /* ECC curves from RFC 4492 */ if ((curve_id < 1) || ((unsigned int)curve_id > sizeof(nid_list) / sizeof(nid_list[0]))) return 0; return nid_list[curve_id - 1]; }
165,963,310,746,840,850,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,368
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls1_ec_nid2curve_id(int nid) { /* ECC curves from RFC 4492 */ switch (nid) { case NID_sect163k1: /* sect163k1 (1) */ return 1; case NID_sect163r1: /* sect163r1 (2) */ return 2; case NID_sect163r2: /* sect163r2 (3) */ return 3; case NID_sect193r1:...
338,554,481,707,152,550,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,369
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls1_heartbeat(SSL *s) { unsigned char *buf, *p; int ret = -1; unsigned int payload = 18; /* Sequence number + random bytes */ unsigned int padding = 16; /* Use minimum padding */ /* Only send if peer supports and accepts HB requests... */ if (!(s->tlsext_heartbeat & SSL_TLSEXT_HB_ENABLED...
20,545,043,936,276,231,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,370
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls1_process_heartbeat(SSL *s) { unsigned char *p = &s->s3->rrec.data[0], *pl; unsigned short hbtype; unsigned int payload; unsigned int padding = 16; /* Use minimum padding */ if (s->msg_callback) s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, &s->s3->rrec.d...
28,008,120,558,891,905,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,371
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls1_process_sigalgs(SSL *s, const unsigned char *data, int dsize) { int i, idx; const EVP_MD *md; CERT *c = s->cert; /* Extension ignored for TLS versions below 1.2 */ if (TLS1_get_version(s) < TLS1_2_VERSION) return 1; /* Should never happen */ if (!c) return 0; c-...
112,453,511,874,238,740,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,372
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
int tls1_process_ticket(SSL *s, unsigned char *session_id, int len, const unsigned char *limit, SSL_SESSION **ret) { /* Point after session ID in client hello */ const unsigned char *p = session_id + len; unsigned short i; *ret = NULL; s->tlsext_ticket_expected = 0; /* ...
273,278,381,600,206,860,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,373
openssl
2c0d295e26306e15a92eb23a84a1802005c1c137
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=2c0d295e26306e15a92eb23a84a1802005c1c137
Fix OCSP Status Request extension unbounded memory growth A malicious client can send an excessively large OCSP Status Request extension. If that client continually requests renegotiation, sending a large OCSP Status Request extension each time, then there will be unbounded memory growth on the server. This will event...
0
static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen, const unsigned char *sess_id, int sesslen, SSL_SESSION **psess) { SSL_SESSION *sess; unsigned char *sdec; const unsigned char *p; int slen, mlen, renew_ticket = 0; ...
50,794,026,404,427,530,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
https://nvd.nist.gov/vuln/detail/CVE-2016-6304
16,374
openssl
55d83bf7c10c7b205fffa23fa7c3977491e56c07
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07
Avoid overflow in MDC2_Update() Thanks to Shi Lei for reporting this issue. CVE-2016-6303 Reviewed-by: Matt Caswell <matt@openssl.org>
0
int MDC2_Final(unsigned char *md, MDC2_CTX *c) { unsigned int i; int j; i = c->num; j = c->pad_type; if ((i > 0) || (j == 2)) { if (j == 2) c->data[i++] = 0x80; memset(&(c->data[i]), 0, MDC2_BLOCK - i); mdc2_body(c, c->data, MDC2_BLOCK); } memcpy(md, (cha...
325,814,000,894,187,200,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-6303
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-6303
16,375
openssl
55d83bf7c10c7b205fffa23fa7c3977491e56c07
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07
Avoid overflow in MDC2_Update() Thanks to Shi Lei for reporting this issue. CVE-2016-6303 Reviewed-by: Matt Caswell <matt@openssl.org>
0
int MDC2_Init(MDC2_CTX *c) { c->num = 0; c->pad_type = 1; memset(&(c->h[0]), 0x52, MDC2_BLOCK); memset(&(c->hh[0]), 0x25, MDC2_BLOCK); return 1; }
321,774,909,733,391,350,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-6303
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-6303
16,376
openssl
55d83bf7c10c7b205fffa23fa7c3977491e56c07
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07
Avoid overflow in MDC2_Update() Thanks to Shi Lei for reporting this issue. CVE-2016-6303 Reviewed-by: Matt Caswell <matt@openssl.org>
0
static void mdc2_body(MDC2_CTX *c, const unsigned char *in, size_t len) { register DES_LONG tin0, tin1; register DES_LONG ttin0, ttin1; DES_LONG d[2], dd[2]; DES_key_schedule k; unsigned char *p; size_t i; for (i = 0; i < len; i += 8) { c2l(in, tin0); d[0] = dd[0] = tin0; ...
37,763,995,803,046,010,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-6303
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-6303
16,377
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int SSL_get_sigalgs(SSL *s, int idx, int *psign, int *phash, int *psignhash, unsigned char *rsig, unsigned char *rhash) { const unsigned char *psig = s->s3->tmp.peer_sigalgs; if (psig == NULL) return 0; if (idx >= 0) { idx <<= 1; if (idx >= (in...
16,941,696,274,101,285,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,378
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int compare_uint(const void *p1, const void *p2) { unsigned int u1 = *((const unsigned int *)p1); unsigned int u2 = *((const unsigned int *)p2); if (u1 < u2) return -1; else if (u1 > u2) return 1; else return 0; }
164,148,423,519,034,680,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,379
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static void get_sigorhash(int *psig, int *phash, const char *str) { if (strcmp(str, "RSA") == 0) { *psig = EVP_PKEY_RSA; } else if (strcmp(str, "DSA") == 0) { *psig = EVP_PKEY_DSA; } else if (strcmp(str, "ECDSA") == 0) { *psig = EVP_PKEY_EC; } else { *phash = OBJ_sn2nid(s...
150,753,839,886,875,480,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,380
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int sig_cb(const char *elem, int len, void *arg) { sig_cb_st *sarg = arg; size_t i; char etmp[20], *p; int sig_alg = NID_undef, hash_alg = NID_undef; if (elem == NULL) return 0; if (sarg->sigalgcnt == MAX_SIGALGLEN) return 0; if (len > (int)(sizeof(etmp) - 1)) ...
203,532,727,234,560,630,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,381
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit, int *al) { int extdatalen = 0; unsigned char *orig = buf; unsigned char *ret = buf; #ifndef OPENSSL_NO_EC /* See if we support any ECC ciphersuites */ int using_ecc =...
105,526,716,221,879,260,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,382
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
unsigned char *ssl_add_serverhello_tlsext(SSL *s, unsigned char *buf, unsigned char *limit, int *al) { int extdatalen = 0; unsigned char *orig = buf; unsigned char *ret = buf; #ifndef OPENSSL_NO_NEXTPROTONEG int next_proto_neg_seen; #endif #ifndef OPENSSL_NO_EC ...
229,188,700,976,770,050,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,383
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int ssl_check_clienthello_tlsext_early(SSL *s) { int ret = SSL_TLSEXT_ERR_NOACK; int al = SSL_AD_UNRECOGNIZED_NAME; #ifndef OPENSSL_NO_EC /* * The handling of the ECPointFormats extension is done elsewhere, namely * in ssl3_choose_cipher in s3_lib.c. */ /* * The handling of t...
228,577,215,252,947,840,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,384
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int ssl_check_clienthello_tlsext_late(SSL *s, int *al) { s->tlsext_status_expected = 0; /* * If status request then ask callback what to do. Note: this must be * called after servername callbacks in case the certificate has changed, * and must be called after the cipher has been chosen because t...
212,814,266,597,152,230,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,385
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static void ssl_check_for_safari(SSL *s, const PACKET *pkt) { unsigned int type; PACKET sni, tmppkt; size_t ext_len; static const unsigned char kSafariExtensionsBlock[] = { 0x00, 0x0a, /* elliptic_curves extension */ 0x00, 0x08, /* 8 bytes */ 0x00, 0x06, ...
331,750,759,486,793,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,386
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static char ssl_next_proto_validate(PACKET *pkt) { PACKET tmp_protocol; while (PACKET_remaining(pkt)) { if (!PACKET_get_length_prefixed_1(pkt, &tmp_protocol) || PACKET_remaining(&tmp_protocol) == 0) return 0; } return 1; }
139,655,657,991,810,170,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,387
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int ssl_parse_clienthello_tlsext(SSL *s, PACKET *pkt) { int al = -1; custom_ext_init(&s->cert->srv_ext); if (ssl_scan_clienthello_tlsext(s, pkt, &al) <= 0) { ssl3_send_alert(s, SSL3_AL_FATAL, al); return 0; } if (ssl_check_clienthello_tlsext_early(s) <= 0) { SSLerr(SSL_F_SSL_...
116,933,713,248,091,660,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,388
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int ssl_parse_serverhello_tlsext(SSL *s, PACKET *pkt) { int al = -1; if (s->version < SSL3_VERSION) return 1; if (ssl_scan_serverhello_tlsext(s, pkt, &al) <= 0) { ssl3_send_alert(s, SSL3_AL_FATAL, al); return 0; } if (ssl_check_serverhello_tlsext(s) <= 0) { SSLerr(SS...
208,178,395,828,817,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,389
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int ssl_prepare_clienthello_tlsext(SSL *s) { s->s3->alpn_sent = 0; return 1; }
62,222,551,390,720,260,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,390
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int ssl_scan_clienthello_tlsext(SSL *s, PACKET *pkt, int *al) { unsigned int type; int renegotiate_seen = 0; PACKET extensions; *al = SSL_AD_DECODE_ERROR; s->servername_done = 0; s->tlsext_status_type = -1; #ifndef OPENSSL_NO_NEXTPROTONEG s->s3->next_proto_neg_seen = 0; #endif O...
4,750,600,259,155,951,400,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,391
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int ssl_scan_serverhello_tlsext(SSL *s, PACKET *pkt, int *al) { unsigned int length, type, size; int tlsext_servername = 0; int renegotiate_seen = 0; #ifndef OPENSSL_NO_NEXTPROTONEG s->s3->next_proto_neg_seen = 0; #endif s->tlsext_ticket_expected = 0; OPENSSL_free(s->s3->alpn_selected);...
336,203,463,093,829,800,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,392
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int ssl_security_cert(SSL *s, SSL_CTX *ctx, X509 *x, int vfy, int is_ee) { if (vfy) vfy = SSL_SECOP_PEER; if (is_ee) { if (!ssl_security_cert_key(s, ctx, x, SSL_SECOP_EE_KEY | vfy)) return SSL_R_EE_KEY_TOO_SMALL; } else { if (!ssl_security_cert_key(s, ctx, x, SSL_SECOP_CA...
124,964,002,267,180,530,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,393
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
int ssl_security_cert_chain(SSL *s, STACK_OF(X509) *sk, X509 *x, int vfy) { int rv, start_idx, i; if (x == NULL) { x = sk_X509_value(sk, 0); start_idx = 1; } else start_idx = 0; rv = ssl_security_cert(s, NULL, x, vfy, 1); if (rv != 1) return rv; for (i = start_i...
123,490,603,775,279,250,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,394
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int ssl_security_cert_key(SSL *s, SSL_CTX *ctx, X509 *x, int op) { int secbits = -1; EVP_PKEY *pkey = X509_get0_pubkey(x); if (pkey) { /* * If no parameters this will return -1 and fail using the default * security callback for any non-zero security level. This will ...
274,150,180,123,720,540,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,395
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int ssl_security_cert_sig(SSL *s, SSL_CTX *ctx, X509 *x, int op) { /* Lookup signature algorithm digest */ int secbits = -1, md_nid = NID_undef, sig_nid; /* Don't check signature if self signed */ if ((X509_get_extension_flags(x) & EXFLAG_SS) != 0) return 1; sig_nid = X509_get_signatu...
165,407,205,110,808,950,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,396
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
void ssl_set_client_disabled(SSL *s) { s->s3->tmp.mask_a = 0; s->s3->tmp.mask_k = 0; ssl_set_sig_mask(&s->s3->tmp.mask_a, s, SSL_SECOP_SIGALG_MASK); ssl_get_client_min_max_version(s, &s->s3->tmp.min_ver, &s->s3->tmp.max_ver); #ifndef OPENSSL_NO_PSK /* with PSK there must be client callback set */ ...
103,094,017,242,059,290,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,397
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
void ssl_set_default_md(SSL *s) { const EVP_MD **pmd = s->s3->tmp.md; #ifndef OPENSSL_NO_DSA pmd[SSL_PKEY_DSA_SIGN] = ssl_md(SSL_MD_SHA1_IDX); #endif #ifndef OPENSSL_NO_RSA if (SSL_USE_SIGALGS(s)) pmd[SSL_PKEY_RSA_SIGN] = ssl_md(SSL_MD_SHA1_IDX); else pmd[SSL_PKEY_RSA_SIGN] = ssl_md(SSL_...
30,455,432,488,457,176,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,398
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
void ssl_set_sig_mask(uint32_t *pmask_a, SSL *s, int op) { const unsigned char *sigalgs; size_t i, sigalgslen; int have_rsa = 0, have_dsa = 0, have_ecdsa = 0; /* * Now go through all signature algorithms seeing if we support any for * RSA, DSA, ECDSA. Do this for all versions not just TLS 1.2....
209,449,019,279,068,950,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,399
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
size_t tls12_copy_sigalgs(SSL *s, unsigned char *out, const unsigned char *psig, size_t psiglen) { unsigned char *tmpout = out; size_t i; for (i = 0; i < psiglen; i += 2, psig += 2) { if (tls12_sigalg_allowed(s, SSL_SECOP_SIGALG_SUPPORTED, psig)) { *tmpout++ = p...
337,753,557,430,749,060,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,400
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int tls12_find_id(int nid, const tls12_lookup *table, size_t tlen) { size_t i; for (i = 0; i < tlen; i++) { if (table[i].nid == nid) return table[i].id; } return -1; }
326,899,647,774,357,470,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,401
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static const tls12_hash_info *tls12_get_hash_info(unsigned char hash_alg) { unsigned int i; if (hash_alg == 0) return NULL; for (i = 0; i < OSSL_NELEM(tls12_md_info); i++) { if (tls12_md_info[i].tlsext_hash == hash_alg) return tls12_md_info + i; } return NULL; }
331,690,337,730,608,620,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302
16,402
openssl
e97763c92c655dcf4af2860b3abd2bc4c8a267f9
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=e97763c92c655dcf4af2860b3abd2bc4c8a267f9
Sanity check ticket length. If a ticket callback changes the HMAC digest to SHA512 the existing sanity checks are not sufficient and an attacker could perform a DoS attack with a malformed ticket. Add additional checks based on HMAC size. Thanks to Shi Lei for reporting this bug. CVE-2016-6302 Reviewed-by: Viktor D...
0
static int tls12_get_pkey_idx(unsigned char sig_alg) { switch (sig_alg) { #ifndef OPENSSL_NO_RSA case TLSEXT_signature_rsa: return SSL_PKEY_RSA_SIGN; #endif #ifndef OPENSSL_NO_DSA case TLSEXT_signature_dsa: return SSL_PKEY_DSA_SIGN; #endif #ifndef OPENSSL_NO_EC case TLSEXT_signature_ecds...
329,938,009,000,619,520,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6302
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
https://nvd.nist.gov/vuln/detail/CVE-2016-6302